Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-6816 (GCVE-0-2023-6816)
Vulnerability from cvelistv5
Published
2024-01-18 04:31
Modified
2025-08-04 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION |
Unaffected: 0:1.1.0-25.el6_10.13 < * cpe:/o:redhat:rhel_els:6 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:42:07.410Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/01/18/1"
},
{
"name": "RHSA-2024:0320",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"name": "RHSA-2024:0557",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"name": "RHSA-2024:0558",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"name": "RHSA-2024:0597",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"name": "RHSA-2024:0607",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"name": "RHSA-2024:0614",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"name": "RHSA-2024:0617",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"name": "RHSA-2024:0621",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"name": "RHSA-2024:0626",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"name": "RHSA-2024:0629",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"name": "RHSA-2024:2169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"name": "RHSA-2024:2170",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"name": "RHSA-2024:2996",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"name": "RHBZ#2257691",
"tags": [
"issue-tracking",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202401-30"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-6816",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-18T14:05:47.630340Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-17T21:19:20.905Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_els:6"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.1.0-25.el6_10.13",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::workstation"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.4-27.el7_9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::workstation"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.8.0-31.el7_9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.13.1-2.el8_9.7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:21.1.3-15.el8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.2::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.9.0-15.el8_2.9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.2::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.9.0-15.el8_2.9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.2::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.9.0-15.el8_2.9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-8.el8_4.8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-8.el8_4.8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-8.el8_4.8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.6 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-6.el8_6.9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 8.8 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-15.el8_8.7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.13.1-3.el9_3.6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.11-24.el9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server-Xwayland",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:22.1.9-5.el9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9.0 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-22.el9_0.8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
],
"defaultStatus": "affected",
"packageName": "tigervnc",
"product": "Red Hat Enterprise Linux 9.2 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-14.el9_2.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "affected",
"packageName": "xorg-x11-server",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue."
}
],
"datePublic": "2024-01-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Important"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-04T21:03:55.383Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2024:0320",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"name": "RHSA-2024:0557",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"name": "RHSA-2024:0558",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"name": "RHSA-2024:0597",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"name": "RHSA-2024:0607",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"name": "RHSA-2024:0614",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"name": "RHSA-2024:0617",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"name": "RHSA-2024:0621",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"name": "RHSA-2024:0626",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"name": "RHSA-2024:0629",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"name": "RHSA-2024:2169",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"name": "RHSA-2024:2170",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"name": "RHSA-2024:2996",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"name": "RHSA-2025:12751",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"name": "RHBZ#2257691",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-01-10T00:00:00+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2024-01-16T00:00:00+00:00",
"value": "Made public."
}
],
"title": "Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer",
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"x_redhatCweChain": "CWE-787: Out-of-bounds Write"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2023-6816",
"datePublished": "2024-01-18T04:31:07.908Z",
"dateReserved": "2023-12-14T04:34:38.017Z",
"dateUpdated": "2025-08-04T21:03:55.383Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-6816\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-01-18T05:15:08.607\",\"lastModified\":\"2025-08-29T13:42:30.557\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.11\",\"matchCriteriaId\":\"049C23AF-DFA5-4F08-A3E6-BBBF75581F05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"23.2.4\",\"matchCriteriaId\":\"1FE48099-1D7F-444E-8F0C-FAB71F25AD71\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0320\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0557\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0558\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0597\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0607\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0614\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0617\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0621\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0626\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0629\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2169\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2170\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2996\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12751\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-6816\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/01/18/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0320\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0597\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2170\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-6816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202401-30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240307-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2024/01/18/1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0320\", \"name\": \"RHSA-2024:0320\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0557\", \"name\": \"RHSA-2024:0557\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0558\", \"name\": \"RHSA-2024:0558\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0597\", \"name\": \"RHSA-2024:0597\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0607\", \"name\": \"RHSA-2024:0607\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0614\", \"name\": \"RHSA-2024:0614\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0617\", \"name\": \"RHSA-2024:0617\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0621\", \"name\": \"RHSA-2024:0621\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0626\", \"name\": \"RHSA-2024:0626\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0629\", \"name\": \"RHSA-2024:0629\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2169\", \"name\": \"RHSA-2024:2169\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2170\", \"name\": \"RHSA-2024:2170\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2996\", \"name\": \"RHSA-2024:2996\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-6816\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\", \"name\": \"RHBZ#2257691\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202401-30\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240307-0006/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T08:42:07.410Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-6816\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-01-18T14:05:47.630340Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-17T21:15:12.249Z\"}}], \"cna\": {\"title\": \"Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:rhel_els:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.1.0-25.el6_10.13\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::server\", \"cpe:/o:redhat:enterprise_linux:7::computenode\", \"cpe:/o:redhat:enterprise_linux:7::client\", \"cpe:/o:redhat:enterprise_linux:7::workstation\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.4-27.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::server\", \"cpe:/o:redhat:enterprise_linux:7::computenode\", \"cpe:/o:redhat:enterprise_linux:7::client\", \"cpe:/o:redhat:enterprise_linux:7::workstation\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.8.0-31.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.13.1-2.el8_9.7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:21.1.3-15.el8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Advanced Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_e4s:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_e4s:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_e4s:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-6.el8_6.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:8.8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-15.el8_8.7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.13.1-3.el9_3.6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-24.el9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:22.1.9-5.el9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.0::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-22.el9_0.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-14.el9_2.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-01-10T00:00:00+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2024-01-16T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2024-01-16T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2024:0320\", \"name\": \"RHSA-2024:0320\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0557\", \"name\": \"RHSA-2024:0557\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0558\", \"name\": \"RHSA-2024:0558\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0597\", \"name\": \"RHSA-2024:0597\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0607\", \"name\": \"RHSA-2024:0607\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0614\", \"name\": \"RHSA-2024:0614\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0617\", \"name\": \"RHSA-2024:0617\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0621\", \"name\": \"RHSA-2024:0621\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0626\", \"name\": \"RHSA-2024:0626\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:0629\", \"name\": \"RHSA-2024:0629\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2169\", \"name\": \"RHSA-2024:2169\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2170\", \"name\": \"RHSA-2024:2170\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2996\", \"name\": \"RHSA-2024:2996\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12751\", \"name\": \"RHSA-2025:12751\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-6816\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\", \"name\": \"RHBZ#2257691\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-08-04T21:03:55.383Z\"}, \"x_redhatCweChain\": \"CWE-787: Out-of-bounds Write\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-6816\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-04T21:03:55.383Z\", \"dateReserved\": \"2023-12-14T04:34:38.017Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2024-01-18T04:31:07.908Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
opensuse-su-2024:13597-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
xorg-x11-server-21.1.11-1.1 on GA media
Notes
Title of the patch
xorg-x11-server-21.1.11-1.1 on GA media
Description of the patch
These are all security issues fixed in the xorg-x11-server-21.1.11-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13597
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xorg-x11-server-21.1.11-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xorg-x11-server-21.1.11-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13597",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13597-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6816 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0229 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0408 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0409 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21886/"
}
],
"title": "xorg-x11-server-21.1.11-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13597-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-1.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.11-1.1.aarch64",
"product_id": "xorg-x11-server-21.1.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-1.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.11-1.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-1.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.11-1.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"product": {
"name": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"product_id": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-1.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.11-1.1.ppc64le",
"product_id": "xorg-x11-server-21.1.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-1.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.11-1.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"product": {
"name": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"product_id": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-1.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.11-1.1.s390x",
"product_id": "xorg-x11-server-21.1.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-1.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.11-1.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-1.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-1.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-1.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.11-1.1.s390x",
"product_id": "xorg-x11-server-source-21.1.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"product": {
"name": "xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"product_id": "xorg-x11-server-wrapper-21.1.11-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.11-1.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.11-1.1.x86_64",
"product_id": "xorg-x11-server-21.1.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.11-1.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.11-1.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.11-1.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.11-1.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64",
"product": {
"name": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64",
"product_id": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64"
},
"product_reference": "xorg-x11-server-source-21.1.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le"
},
"product_reference": "xorg-x11-server-source-21.1.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x"
},
"product_reference": "xorg-x11-server-source-21.1.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64"
},
"product_reference": "xorg-x11-server-source-21.1.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64"
},
"product_reference": "xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le"
},
"product_reference": "xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wrapper-21.1.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x"
},
"product_reference": "xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
},
"product_reference": "xorg-x11-server-wrapper-21.1.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6816"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6816",
"url": "https://www.suse.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "SUSE Bug 1218582 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0229"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0229",
"url": "https://www.suse.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "SUSE Bug 1218583 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-0408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0408"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0408",
"url": "https://www.suse.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "SUSE Bug 1218845 for CVE-2024-0408",
"url": "https://bugzilla.suse.com/1218845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-0408"
},
{
"cve": "CVE-2024-0409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0409"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0409",
"url": "https://www.suse.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "SUSE Bug 1218846 for CVE-2024-0409",
"url": "https://bugzilla.suse.com/1218846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-0409"
},
{
"cve": "CVE-2024-21885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21885"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21885",
"url": "https://www.suse.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "SUSE Bug 1218584 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21886"
}
],
"notes": [
{
"category": "general",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21886",
"url": "https://www.suse.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "SUSE Bug 1218585 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-extra-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-source-21.1.11-1.1.x86_64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.aarch64",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.ppc64le",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.s390x",
"openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-21886"
}
]
}
opensuse-su-2024:13598-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
xwayland-23.2.4-1.1 on GA media
Notes
Title of the patch
xwayland-23.2.4-1.1 on GA media
Description of the patch
These are all security issues fixed in the xwayland-23.2.4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13598
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xwayland-23.2.4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xwayland-23.2.4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13598",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13598-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6816 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0229 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0408 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0409 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21886/"
}
],
"title": "xwayland-23.2.4-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13598-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-23.2.4-1.1.aarch64",
"product": {
"name": "xwayland-23.2.4-1.1.aarch64",
"product_id": "xwayland-23.2.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-23.2.4-1.1.aarch64",
"product": {
"name": "xwayland-devel-23.2.4-1.1.aarch64",
"product_id": "xwayland-devel-23.2.4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-23.2.4-1.1.ppc64le",
"product": {
"name": "xwayland-23.2.4-1.1.ppc64le",
"product_id": "xwayland-23.2.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-23.2.4-1.1.ppc64le",
"product": {
"name": "xwayland-devel-23.2.4-1.1.ppc64le",
"product_id": "xwayland-devel-23.2.4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-23.2.4-1.1.s390x",
"product": {
"name": "xwayland-23.2.4-1.1.s390x",
"product_id": "xwayland-23.2.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-23.2.4-1.1.s390x",
"product": {
"name": "xwayland-devel-23.2.4-1.1.s390x",
"product_id": "xwayland-devel-23.2.4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-23.2.4-1.1.x86_64",
"product": {
"name": "xwayland-23.2.4-1.1.x86_64",
"product_id": "xwayland-23.2.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-23.2.4-1.1.x86_64",
"product": {
"name": "xwayland-devel-23.2.4-1.1.x86_64",
"product_id": "xwayland-devel-23.2.4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-23.2.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64"
},
"product_reference": "xwayland-23.2.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-23.2.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le"
},
"product_reference": "xwayland-23.2.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-23.2.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x"
},
"product_reference": "xwayland-23.2.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-23.2.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64"
},
"product_reference": "xwayland-23.2.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-23.2.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64"
},
"product_reference": "xwayland-devel-23.2.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-23.2.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le"
},
"product_reference": "xwayland-devel-23.2.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-23.2.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x"
},
"product_reference": "xwayland-devel-23.2.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-23.2.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
},
"product_reference": "xwayland-devel-23.2.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6816"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6816",
"url": "https://www.suse.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "SUSE Bug 1218582 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0229"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0229",
"url": "https://www.suse.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "SUSE Bug 1218583 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-0408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0408"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0408",
"url": "https://www.suse.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "SUSE Bug 1218845 for CVE-2024-0408",
"url": "https://bugzilla.suse.com/1218845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-0408"
},
{
"cve": "CVE-2024-0409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0409"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0409",
"url": "https://www.suse.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "SUSE Bug 1218846 for CVE-2024-0409",
"url": "https://bugzilla.suse.com/1218846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-0409"
},
{
"cve": "CVE-2024-21885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21885"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21885",
"url": "https://www.suse.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "SUSE Bug 1218584 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21886"
}
],
"notes": [
{
"category": "general",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21886",
"url": "https://www.suse.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "SUSE Bug 1218585 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-23.2.4-1.1.x86_64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.aarch64",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.s390x",
"openSUSE Tumbleweed:xwayland-devel-23.2.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-21886"
}
]
}
rhsa-2024:0597
Vulnerability from csaf_redhat
Published
2024-01-30 14:14
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0597",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0597.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:50+00:00",
"generator": {
"date": "2025-11-06T21:57:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0597",
"initial_release_date": "2024-01-30T14:14:03+00:00",
"revision_history": [
{
"date": "2024-01-30T14:14:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T14:14:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-15.el8_8.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-15.el8_8.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-15.el8_8.7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_2996
Vulnerability from csaf_redhat
Published
2024-05-22 10:12
Modified
2024-11-25 09:49
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2996",
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2996.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2024-11-25T09:49:58+00:00",
"generator": {
"date": "2024-11-25T09:49:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:2996",
"initial_release_date": "2024-05-22T10:12:23+00:00",
"revision_history": [
{
"date": "2024-05-22T10:12:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-22T10:12:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:49:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:0558
Vulnerability from csaf_redhat
Published
2024-01-30 11:03
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0558",
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0558.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:45+00:00",
"generator": {
"date": "2025-11-06T21:57:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0558",
"initial_release_date": "2024-01-30T11:03:52+00:00",
"revision_history": [
{
"date": "2024-01-30T11:03:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T11:03:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-8.el8_4.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-8.el8_4.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-8.el8_4.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0614
Vulnerability from csaf_redhat
Published
2024-01-30 15:25
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0614",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0614.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:48+00:00",
"generator": {
"date": "2025-11-06T21:57:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0614",
"initial_release_date": "2024-01-30T15:25:28+00:00",
"revision_history": [
{
"date": "2024-01-30T15:25:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T15:25:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0320
Vulnerability from csaf_redhat
Published
2024-01-22 13:53
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0320",
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0320.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2024-11-25T09:44:04+00:00",
"generator": {
"date": "2024-11-25T09:44:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0320",
"initial_release_date": "2024-01-22T13:53:02+00:00",
"revision_history": [
{
"date": "2024-01-22T13:53:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-22T13:53:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:44:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product_id": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-27.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product_id": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-27.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0320
Vulnerability from csaf_redhat
Published
2024-01-22 13:53
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0320",
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0320.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:36+00:00",
"generator": {
"date": "2025-11-06T21:57:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0320",
"initial_release_date": "2024-01-22T13:53:02+00:00",
"revision_history": [
{
"date": "2024-01-22T13:53:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-22T13:53:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product_id": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-27.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product_id": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-27.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0607
Vulnerability from csaf_redhat
Published
2024-01-30 14:56
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0607",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0607.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:44:18+00:00",
"generator": {
"date": "2024-11-25T09:44:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0607",
"initial_release_date": "2024-01-30T14:56:13+00:00",
"revision_history": [
{
"date": "2024-01-30T14:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T14:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:44:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-2.el8_9.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-2.el8_9.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-2.el8_9.7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.src",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:2170
Vulnerability from csaf_redhat
Published
2024-04-30 09:50
Modified
2025-11-06 21:59
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2170",
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2170.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2025-11-06T21:59:05+00:00",
"generator": {
"date": "2025-11-06T21:59:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:2170",
"initial_release_date": "2024-04-30T09:50:06+00:00",
"revision_history": [
{
"date": "2024-04-30T09:50:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T09:50:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:59:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0629
Vulnerability from csaf_redhat
Published
2024-01-31 08:52
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0629",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0629.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:45:33+00:00",
"generator": {
"date": "2024-11-25T09:45:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0629",
"initial_release_date": "2024-01-31T08:52:59+00:00",
"revision_history": [
{
"date": "2024-01-31T08:52:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T08:52:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:45:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.src",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.src",
"product_id": "tigervnc-0:1.8.0-31.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-31.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-31.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-31.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_2169
Vulnerability from csaf_redhat
Published
2024-04-30 10:11
Modified
2024-11-25 09:49
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\n* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2169",
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2244736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2169.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2024-11-25T09:49:10+00:00",
"generator": {
"date": "2024-11-25T09:49:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:2169",
"initial_release_date": "2024-04-30T10:11:05+00:00",
"revision_history": [
{
"date": "2024-04-30T10:11:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T10:11:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:49:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product_id": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-24.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.11-24.el9.src",
"product": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src",
"product_id": "xorg-x11-server-0:1.20.11-24.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-24.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-24.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-24.el9.src",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"relates_to_product_reference": "CRB-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"cve": "CVE-2023-5380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-10-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2244736"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Use-after-free bug in DestroyWindow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The xorg-x11-server-Xwayland package as shipped by Red Hat Enterprise Linux 8 and 9 is not affected by this issue as Xwayland does not support multiple protocol screens and is not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5380"
},
{
"category": "external",
"summary": "RHBZ#2244736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Use-after-free bug in DestroyWindow"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:0607
Vulnerability from csaf_redhat
Published
2024-01-30 14:56
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0607",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0607.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:47+00:00",
"generator": {
"date": "2025-11-06T21:57:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0607",
"initial_release_date": "2024-01-30T14:56:13+00:00",
"revision_history": [
{
"date": "2024-01-30T14:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T14:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-2.el8_9.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-2.el8_9.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-2.el8_9.7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.src",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:0617
Vulnerability from csaf_redhat
Published
2024-01-31 07:10
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0617",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0617.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:48+00:00",
"generator": {
"date": "2025-11-06T21:57:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0617",
"initial_release_date": "2024-01-31T07:10:52+00:00",
"revision_history": [
{
"date": "2024-01-31T07:10:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T07:10:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0626
Vulnerability from csaf_redhat
Published
2024-01-31 08:35
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0626",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0626.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:45:57+00:00",
"generator": {
"date": "2024-11-25T09:45:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0626",
"initial_release_date": "2024-01-31T08:35:55+00:00",
"revision_history": [
{
"date": "2024-01-31T08:35:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T08:35:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:45:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0597
Vulnerability from csaf_redhat
Published
2024-01-30 14:14
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0597",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0597.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:50+00:00",
"generator": {
"date": "2025-11-06T21:57:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0597",
"initial_release_date": "2024-01-30T14:14:03+00:00",
"revision_history": [
{
"date": "2024-01-30T14:14:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T14:14:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-15.el8_8.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-15.el8_8.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-15.el8_8.7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:0626
Vulnerability from csaf_redhat
Published
2024-01-31 08:35
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0626",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0626.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:50+00:00",
"generator": {
"date": "2025-11-06T21:57:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0626",
"initial_release_date": "2024-01-31T08:35:55+00:00",
"revision_history": [
{
"date": "2024-01-31T08:35:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T08:35:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0629
Vulnerability from csaf_redhat
Published
2024-01-31 08:52
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0629",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0629.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:51+00:00",
"generator": {
"date": "2025-11-06T21:57:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0629",
"initial_release_date": "2024-01-31T08:52:59+00:00",
"revision_history": [
{
"date": "2024-01-31T08:52:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T08:52:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.src",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.src",
"product_id": "tigervnc-0:1.8.0-31.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-31.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-31.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-31.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0621
Vulnerability from csaf_redhat
Published
2024-01-30 16:13
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0621",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0621.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:45:20+00:00",
"generator": {
"date": "2024-11-25T09:45:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0621",
"initial_release_date": "2024-01-30T16:13:28+00:00",
"revision_history": [
{
"date": "2024-01-30T16:13:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T16:13:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:45:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:2996
Vulnerability from csaf_redhat
Published
2024-05-22 10:12
Modified
2025-11-06 21:59
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2996",
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2996.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2025-11-06T21:59:26+00:00",
"generator": {
"date": "2025-11-06T21:59:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:2996",
"initial_release_date": "2024-05-22T10:12:23+00:00",
"revision_history": [
{
"date": "2024-05-22T10:12:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-22T10:12:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:59:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0621
Vulnerability from csaf_redhat
Published
2024-01-30 16:13
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0621",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0621.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:49+00:00",
"generator": {
"date": "2025-11-06T21:57:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0621",
"initial_release_date": "2024-01-30T16:13:28+00:00",
"revision_history": [
{
"date": "2024-01-30T16:13:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T16:13:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0614
Vulnerability from csaf_redhat
Published
2024-01-30 15:25
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0614",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0614.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:44:42+00:00",
"generator": {
"date": "2024-11-25T09:44:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0614",
"initial_release_date": "2024-01-30T15:25:28+00:00",
"revision_history": [
{
"date": "2024-01-30T15:25:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T15:25:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:44:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:0621
Vulnerability from csaf_redhat
Published
2024-01-30 16:13
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0621",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0621.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:49+00:00",
"generator": {
"date": "2025-11-06T21:57:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0621",
"initial_release_date": "2024-01-30T16:13:28+00:00",
"revision_history": [
{
"date": "2024-01-30T16:13:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T16:13:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T16:13:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src",
"AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x",
"AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:2169
Vulnerability from csaf_redhat
Published
2024-04-30 10:11
Modified
2025-11-06 21:59
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\n* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2169",
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2244736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2169.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2025-11-06T21:59:04+00:00",
"generator": {
"date": "2025-11-06T21:59:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:2169",
"initial_release_date": "2024-04-30T10:11:05+00:00",
"revision_history": [
{
"date": "2024-04-30T10:11:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T10:11:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:59:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product_id": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-24.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.11-24.el9.src",
"product": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src",
"product_id": "xorg-x11-server-0:1.20.11-24.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-24.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-24.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-24.el9.src",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"relates_to_product_reference": "CRB-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"cve": "CVE-2023-5380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-10-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2244736"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Use-after-free bug in DestroyWindow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The xorg-x11-server-Xwayland package as shipped by Red Hat Enterprise Linux 8 and 9 is not affected by this issue as Xwayland does not support multiple protocol screens and is not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5380"
},
{
"category": "external",
"summary": "RHBZ#2244736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Use-after-free bug in DestroyWindow"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0607
Vulnerability from csaf_redhat
Published
2024-01-30 14:56
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0607",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0607.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:47+00:00",
"generator": {
"date": "2025-11-06T21:57:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0607",
"initial_release_date": "2024-01-30T14:56:13+00:00",
"revision_history": [
{
"date": "2024-01-30T14:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T14:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-2.el8_9.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-2.el8_9.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product": {
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product_id": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-2.el8_9.7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.src",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch"
},
"product_reference": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src",
"AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x",
"AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0626
Vulnerability from csaf_redhat
Published
2024-01-31 08:35
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0626",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0626.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:50+00:00",
"generator": {
"date": "2025-11-06T21:57:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0626",
"initial_release_date": "2024-01-31T08:35:55+00:00",
"revision_history": [
{
"date": "2024-01-31T08:35:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T08:35:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:35:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src",
"AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x",
"AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0557
Vulnerability from csaf_redhat
Published
2024-01-30 11:00
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0557",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0557.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:44:55+00:00",
"generator": {
"date": "2024-11-25T09:44:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0557",
"initial_release_date": "2024-01-30T11:00:18+00:00",
"revision_history": [
{
"date": "2024-01-30T11:00:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T11:00:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:44:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-3.el9_3.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-3.el9_3.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-3.el9_3.6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.src",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2025:12751
Vulnerability from csaf_redhat
Published
2025-08-04 16:35
Modified
2025-11-06 22:02
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: XTestSwapFakeInput stack overflow (CVE-2022-46340)
* xorg-x11-server: XIPassiveUngrab out-of-bounds access (CVE-2022-46341)
* xorg-x11-server: XvdiSelectVideoNotify use-after-free (CVE-2022-46342)
* xorg-x11-server: ScreenSaverSetAttributes use-after-free (CVE-2022-46343)
* xorg-x11-server: XIChangeProperty out-of-bounds access (CVE-2022-46344)
* xorg-x11-server: XkbGetKbdByName use-after-free (CVE-2022-4283)
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)
* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393)
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885,ZDI-CAN-22744)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886,ZDI-CAN-22840)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229,ZDI-CAN-22678)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)
* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSION.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: XTestSwapFakeInput stack overflow (CVE-2022-46340)\n\n* xorg-x11-server: XIPassiveUngrab out-of-bounds access (CVE-2022-46341)\n\n* xorg-x11-server: XvdiSelectVideoNotify use-after-free (CVE-2022-46342)\n\n* xorg-x11-server: ScreenSaverSetAttributes use-after-free (CVE-2022-46343)\n\n* xorg-x11-server: XIChangeProperty out-of-bounds access (CVE-2022-46344)\n\n* xorg-x11-server: XkbGetKbdByName use-after-free (CVE-2022-4283)\n\n* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)\n\n* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393)\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885,ZDI-CAN-22744)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886,ZDI-CAN-22840)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229,ZDI-CAN-22678)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\n* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12751",
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2151755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151755"
},
{
"category": "external",
"summary": "2151756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151756"
},
{
"category": "external",
"summary": "2151757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151757"
},
{
"category": "external",
"summary": "2151758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151758"
},
{
"category": "external",
"summary": "2151760",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151760"
},
{
"category": "external",
"summary": "2151761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151761"
},
{
"category": "external",
"summary": "2165995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165995"
},
{
"category": "external",
"summary": "2180288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180288"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "2271997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
},
{
"category": "external",
"summary": "2271998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
},
{
"category": "external",
"summary": "2272000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
},
{
"category": "external",
"summary": "2317233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317233"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12751.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T22:02:11+00:00",
"generator": {
"date": "2025-11-06T22:02:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:12751",
"initial_release_date": "2025-08-04T16:35:43+00:00",
"revision_history": [
{
"date": "2025-08-04T16:35:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-04T16:35:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T22:02:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product": {
"name": "Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.1.0-25.el6_10.13.src",
"product": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.src",
"product_id": "tigervnc-0:1.1.0-25.el6_10.13.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"product": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"product_id": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"product": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"product_id": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.1.0-25.el6_10.13?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
"product": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
"product_id": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"product": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.1.0-25.el6_10.13.i686",
"product": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.i686",
"product_id": "tigervnc-0:1.1.0-25.el6_10.13.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=i686"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"product": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=i686"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"product": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=i686"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"product": {
"name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"product_id": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.1.0-25.el6_10.13?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"product_id": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.1.0-25.el6_10.13?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686"
},
"product_reference": "tigervnc-0:1.1.0-25.el6_10.13.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x"
},
"product_reference": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.src as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src"
},
"product_reference": "tigervnc-0:1.1.0-25.el6_10.13.src",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64"
},
"product_reference": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686"
},
"product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686"
},
"product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x"
},
"product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64"
},
"product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686"
},
"product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
"product_id": "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"relates_to_product_reference": "6Server-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686"
},
"product_reference": "tigervnc-0:1.1.0-25.el6_10.13.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x"
},
"product_reference": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.src as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src"
},
"product_reference": "tigervnc-0:1.1.0-25.el6_10.13.src",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64"
},
"product_reference": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686"
},
"product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686"
},
"product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x"
},
"product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64"
},
"product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686"
},
"product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
"product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-4283",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151761"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in X.Org. This issue occurs because the XkbCopyNames function leaves a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: XkbGetKbdByName use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4283"
},
{
"category": "external",
"summary": "RHBZ#2151761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4283"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4283",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4283"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: XkbGetKbdByName use-after-free"
},
{
"cve": "CVE-2022-46340",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151755"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: XTestSwapFakeInput stack overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46340"
},
{
"category": "external",
"summary": "RHBZ#2151755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151755"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46340"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46340",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46340"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: XTestSwapFakeInput stack overflow"
},
{
"cve": "CVE-2022-46341",
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151756"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in X.Org. This issue occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: XIPassiveUngrab out-of-bounds access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46341"
},
{
"category": "external",
"summary": "RHBZ#2151756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151756"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46341"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: XIPassiveUngrab out-of-bounds access"
},
{
"cve": "CVE-2022-46342",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151757"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in X.Org. This flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: XvdiSelectVideoNotify use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46342"
},
{
"category": "external",
"summary": "RHBZ#2151757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46342"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46342",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46342"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: XvdiSelectVideoNotify use-after-free"
},
{
"cve": "CVE-2022-46343",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151758"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in X.Org. This issue occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This flaw can lead to local privileges elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: ScreenSaverSetAttributes use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46343"
},
{
"category": "external",
"summary": "RHBZ#2151758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151758"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46343"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46343",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46343"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: ScreenSaverSetAttributes use-after-free"
},
{
"cve": "CVE-2022-46344",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151760"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in X.Org. The issue occurs because the handler for the XIChangeProperty request has a length-validation issue, resulting in out-of-bounds memory reads and potential information disclosure. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: XIChangeProperty out-of-bounds access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46344"
},
{
"category": "external",
"summary": "RHBZ#2151760",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151760"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46344"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46344",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46344"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: XIChangeProperty out-of-bounds access"
},
{
"cve": "CVE-2023-0494",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2165995"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0494"
},
{
"category": "external",
"summary": "RHBZ#2165995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165995"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0494"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-5v6x-2hpj-c37x",
"url": "https://github.com/advisories/GHSA-5v6x-2hpj-c37x"
}
],
"release_date": "2023-02-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation"
},
{
"cve": "CVE-2023-1393",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180288"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in X.Org Server. This flaw occurs if a client explicitly destroys the compositor overlay window (aka COW), where Xserver leaves a dangling pointer to that window in the CompScreen structure, which will later trigger a use-after-free issue. The Overlay Window use-after-free issue can lead to a local privilege escalation vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9. Therefore, Red Hat Enterprise Linux 8 and 9 have been rated Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1393"
},
{
"category": "external",
"summary": "RHBZ#2180288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180288"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1393"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1393",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1393"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-March/003374.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-March/003374.html"
}
],
"release_date": "2023-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability"
},
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"cve": "CVE-2024-9632",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-10-08T13:37:25.514000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2317233"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-9632"
},
{
"category": "external",
"summary": "RHBZ#2317233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317233"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-9632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9632"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9632",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9632"
}
],
"release_date": "2024-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
},
{
"cve": "CVE-2024-31080",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"discovery_date": "2024-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271997"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-31080"
},
{
"category": "external",
"summary": "RHBZ#2271997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
},
{
"cve": "CVE-2024-31081",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"discovery_date": "2024-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271998"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-31081"
},
{
"category": "external",
"summary": "RHBZ#2271998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
},
{
"cve": "CVE-2024-31083",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2272000"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-31083"
},
{
"category": "external",
"summary": "RHBZ#2272000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
}
],
"release_date": "2024-04-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T16:35:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
"6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
"6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
"6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
"6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
}
]
}
rhsa-2024:0629
Vulnerability from csaf_redhat
Published
2024-01-31 08:52
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0629",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0629.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:51+00:00",
"generator": {
"date": "2025-11-06T21:57:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0629",
"initial_release_date": "2024-01-31T08:52:59+00:00",
"revision_history": [
{
"date": "2024-01-31T08:52:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T08:52:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.src",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.src",
"product_id": "tigervnc-0:1.8.0-31.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-31.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-31.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product_id": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-31.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T08:52:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src",
"7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x",
"7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_2170
Vulnerability from csaf_redhat
Published
2024-04-30 09:50
Modified
2024-11-25 09:49
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2170",
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2170.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2024-11-25T09:49:22+00:00",
"generator": {
"date": "2024-11-25T09:49:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:2170",
"initial_release_date": "2024-04-30T09:50:06+00:00",
"revision_history": [
{
"date": "2024-04-30T09:50:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T09:50:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:49:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:2169
Vulnerability from csaf_redhat
Published
2024-04-30 10:11
Modified
2025-11-06 21:59
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\n* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2169",
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2244736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2169.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2025-11-06T21:59:04+00:00",
"generator": {
"date": "2025-11-06T21:59:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:2169",
"initial_release_date": "2024-04-30T10:11:05+00:00",
"revision_history": [
{
"date": "2024-04-30T10:11:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T10:11:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:59:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product_id": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product_id": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-24.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.11-24.el9.src",
"product": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src",
"product_id": "xorg-x11-server-0:1.20.11-24.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-24.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-24.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src"
},
"product_reference": "xorg-x11-server-0:1.20.11-24.el9.src",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"relates_to_product_reference": "CRB-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"cve": "CVE-2023-5380",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-10-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2244736"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Use-after-free bug in DestroyWindow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The xorg-x11-server-Xwayland package as shipped by Red Hat Enterprise Linux 8 and 9 is not affected by this issue as Xwayland does not support multiple protocol screens and is not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5380"
},
{
"category": "external",
"summary": "RHBZ#2244736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Use-after-free bug in DestroyWindow"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:11:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch",
"CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x",
"CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64",
"CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:2996
Vulnerability from csaf_redhat
Published
2024-05-22 10:12
Modified
2025-11-06 21:59
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2996",
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2996.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2025-11-06T21:59:26+00:00",
"generator": {
"date": "2025-11-06T21:59:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:2996",
"initial_release_date": "2024-05-22T10:12:23+00:00",
"revision_history": [
{
"date": "2024-05-22T10:12:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-22T10:12:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:59:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x",
"AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:0320
Vulnerability from csaf_redhat
Published
2024-01-22 13:53
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0320",
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0320.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:36+00:00",
"generator": {
"date": "2025-11-06T21:57:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0320",
"initial_release_date": "2024-01-22T13:53:02+00:00",
"revision_history": [
{
"date": "2024-01-22T13:53:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-22T13:53:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product_id": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-27.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product_id": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-27.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src"
},
"product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64"
},
"product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
},
"product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-22T13:53:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch",
"7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x",
"7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le",
"7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64",
"7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:2170
Vulnerability from csaf_redhat
Published
2024-04-30 09:50
Modified
2025-11-06 21:59
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2170",
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2170.json"
}
],
"title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
"tracking": {
"current_release_date": "2025-11-06T21:59:05+00:00",
"generator": {
"date": "2025-11-06T21:59:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:2170",
"initial_release_date": "2024-04-30T09:50:06+00:00",
"revision_history": [
{
"date": "2024-04-30T09:50:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T09:50:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:59:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
},
"product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5367",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-10-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243091"
}
],
"notes": [
{
"category": "description",
"text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5367"
},
{
"category": "external",
"summary": "RHBZ#2243091",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
}
],
"release_date": "2023-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6377",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6377"
},
{
"category": "external",
"summary": "RHBZ#2253291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6377"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions"
},
{
"acknowledgments": [
{
"names": [
"Peter Hutterer"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-6478",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6478"
},
{
"category": "external",
"summary": "RHBZ#2253298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
"url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
},
{
"category": "external",
"summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
"url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
}
],
"release_date": "2023-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan",
"Donn Seeley"
]
}
],
"cve": "CVE-2024-0408",
"cwe": {
"id": "CWE-158",
"name": "Improper Neutralization of Null Byte or NUL Character"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257689"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux unlabeled GLX PBuffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "RHBZ#2257689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0408"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux unlabeled GLX PBuffer"
},
{
"acknowledgments": [
{
"names": [
"Olivier Fourdan"
]
}
],
"cve": "CVE-2024-0409",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257690"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: SELinux context corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "RHBZ#2257690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: SELinux context corruption"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:50:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x",
"AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0558
Vulnerability from csaf_redhat
Published
2024-01-30 11:03
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0558",
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0558.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:45:08+00:00",
"generator": {
"date": "2024-11-25T09:45:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0558",
"initial_release_date": "2024-01-30T11:03:52+00:00",
"revision_history": [
{
"date": "2024-01-30T11:03:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T11:03:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:45:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-8.el8_4.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-8.el8_4.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-8.el8_4.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0597
Vulnerability from csaf_redhat
Published
2024-01-30 14:14
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0597",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0597.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:44:30+00:00",
"generator": {
"date": "2024-11-25T09:44:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0597",
"initial_release_date": "2024-01-30T14:14:03+00:00",
"revision_history": [
{
"date": "2024-01-30T14:14:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T14:14:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:44:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-15.el8_8.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-15.el8_8.7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product": {
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product_id": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-15.el8_8.7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch"
},
"product_reference": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T14:14:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src",
"AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x",
"AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024_0617
Vulnerability from csaf_redhat
Published
2024-01-31 07:10
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0617",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0617.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2024-11-25T09:45:45+00:00",
"generator": {
"date": "2024-11-25T09:45:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:0617",
"initial_release_date": "2024-01-31T07:10:52+00:00",
"revision_history": [
{
"date": "2024-01-31T07:10:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T07:10:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T09:45:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:0614
Vulnerability from csaf_redhat
Published
2024-01-30 15:25
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0614",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0614.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:48+00:00",
"generator": {
"date": "2025-11-06T21:57:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0614",
"initial_release_date": "2024-01-30T15:25:28+00:00",
"revision_history": [
{
"date": "2024-01-30T15:25:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T15:25:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product": {
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T15:25:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src",
"AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x",
"AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
rhsa-2024:0557
Vulnerability from csaf_redhat
Published
2024-01-30 11:00
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0557",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0557.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:44+00:00",
"generator": {
"date": "2025-11-06T21:57:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0557",
"initial_release_date": "2024-01-30T11:00:18+00:00",
"revision_history": [
{
"date": "2024-01-30T11:00:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T11:00:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-3.el9_3.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-3.el9_3.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-3.el9_3.6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.src",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0617
Vulnerability from csaf_redhat
Published
2024-01-31 07:10
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0617",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0617.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:48+00:00",
"generator": {
"date": "2025-11-06T21:57:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0617",
"initial_release_date": "2024-01-31T07:10:52+00:00",
"revision_history": [
{
"date": "2024-01-31T07:10:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-31T07:10:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch"
},
"product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-31T07:10:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le",
"AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src",
"AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch",
"AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64",
"AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0557
Vulnerability from csaf_redhat
Published
2024-01-30 11:00
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0557",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0557.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:44+00:00",
"generator": {
"date": "2025-11-06T21:57:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0557",
"initial_release_date": "2024-01-30T11:00:18+00:00",
"revision_history": [
{
"date": "2024-01-30T11:00:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T11:00:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-3.el9_3.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-3.el9_3.6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product": {
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product_id": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-3.el9_3.6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.src",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch"
},
"product_reference": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src",
"AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x",
"AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
RHSA-2024:0558
Vulnerability from csaf_redhat
Published
2024-01-30 11:03
Modified
2025-11-06 21:57
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0558",
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0558.json"
}
],
"title": "Red Hat Security Advisory: tigervnc security update",
"tracking": {
"current_release_date": "2025-11-06T21:57:45+00:00",
"generator": {
"date": "2025-11-06T21:57:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2024:0558",
"initial_release_date": "2024-01-30T11:03:52+00:00",
"revision_history": [
{
"date": "2024-01-30T11:03:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T11:03:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T21:57:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-8.el8_4.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-8.el8_4.8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product_id": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-8.el8_4.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch"
},
"product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
},
"product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257691"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "RHBZ#2257691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2024-0229",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256690"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "RHBZ#2256690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21885",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256540"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "RHBZ#2256540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
},
{
"acknowledgments": [
{
"names": [
"Jan-Niklas Sohn"
],
"organization": "Trend Micro Zero Day Initiative"
}
],
"cve": "CVE-2024-21886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256542"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xorg-x11-server: heap buffer overflow in DisableDevice",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "RHBZ#2256542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T11:03:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le",
"AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src",
"AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch",
"AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64",
"AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xorg-x11-server: heap buffer overflow in DisableDevice"
}
]
}
gsd-2023-6816
Vulnerability from gsd
Modified
2023-12-14 06:01
Details
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-6816"
],
"details": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"id": "GSD-2023-6816",
"modified": "2023-12-14T06:01:34.603483Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-6816",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.20.4-27.el7_9",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.8.0-31.el7_9",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.13.1-2.el8_9.7",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.9.0-15.el8_2.9",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.9.0-15.el8_2.9",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.9.0-15.el8_2.9",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-8.el8_4.8",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-8.el8_4.8",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-8.el8_4.8",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-6.el8_6.9",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-15.el8_8.7",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.13.1-3.el9_3.6",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.11.0-22.el9_0.8",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:1.12.0-14.el9_2.5",
"versionType": "rpm"
}
]
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
}
]
},
"vendor_name": "Red Hat"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-787",
"lang": "eng",
"value": "Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.openwall.com/lists/oss-security/2024/01/18/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2024/01/18/1"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0320",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0557",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0558",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0597",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0607",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0614",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0617",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0621",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0626",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"name": "https://access.redhat.com/errata/RHSA-2024:0629",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2023-6816",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"name": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/"
},
{
"name": "https://security.gentoo.org/glsa/202401-30",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202401-30"
},
{
"name": "https://security.netapp.com/advisory/ntap-20240307-0006/",
"refsource": "MISC",
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
]
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "565381E7-E0BD-408F-B970-34E9724B1B08",
"versionEndExcluding": "21.1.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE48099-1D7F-444E-8F0C-FAB71F25AD71",
"versionEndExcluding": "23.2.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor."
}
],
"id": "CVE-2023-6816",
"lastModified": "2024-03-07T17:15:12.180",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2024-01-18T05:15:08.607",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2024/01/18/1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/"
},
{
"source": "secalert@redhat.com",
"url": "https://security.gentoo.org/glsa/202401-30"
},
{
"source": "secalert@redhat.com",
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
}
}
}
fkie_cve-2023-6816
Vulnerability from fkie_nvd
Published
2024-01-18 05:15
Modified
2025-08-29 13:42
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0320 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0557 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0558 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0597 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0607 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0614 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0617 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0621 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0626 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:0629 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2169 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2170 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2996 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12751 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-6816 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2257691 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/01/18/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0320 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0557 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0558 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0597 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0607 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0614 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0617 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0621 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0626 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:0629 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2169 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2170 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2996 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-6816 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2257691 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202401-30 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240307-0006/ |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| x.org | x_server | * | |
| x.org | xwayland | * | |
| fedoraproject | fedora | 39 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_workstation | 7.0 | |
| debian | debian_linux | 10.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "049C23AF-DFA5-4F08-A3E6-BBBF75581F05",
"versionEndExcluding": "21.1.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FE48099-1D7F-444E-8F0C-FAB71F25AD71",
"versionEndExcluding": "23.2.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor."
}
],
"id": "CVE-2023-6816",
"lastModified": "2025-08-29T13:42:30.557",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-01-18T05:15:08.607",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2024/01/18/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202401-30"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20240307-0006/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
suse-su-2024:0116-1
Vulnerability from csaf_suse
Published
2024-01-16 12:30
Modified
2024-01-16 12:30
Summary
Security update for xorg-x11-server
Notes
Title of the patch
Security update for xorg-x11-server
Description of the patch
This update for xorg-x11-server fixes the following issues:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Patchnames
SUSE-2024-116,SUSE-SLE-SDK-12-SP5-2024-116,SUSE-SLE-SERVER-12-SP5-2024-116
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-116,SUSE-SLE-SDK-12-SP5-2024-116,SUSE-SLE-SERVER-12-SP5-2024-116",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0116-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0116-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240116-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0116-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html"
},
{
"category": "self",
"summary": "SUSE Bug 1218582",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "self",
"summary": "SUSE Bug 1218583",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "self",
"summary": "SUSE Bug 1218584",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "self",
"summary": "SUSE Bug 1218585",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6816 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0229 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21886/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2024-01-16T12:30:32Z",
"generator": {
"date": "2024-01-16T12:30:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0116-1",
"initial_release_date": "2024-01-16T12:30:32Z",
"revision_history": [
{
"date": "2024-01-16T12:30:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.65.1.aarch64",
"product": {
"name": "xorg-x11-server-1.19.6-10.65.1.aarch64",
"product_id": "xorg-x11-server-1.19.6-10.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"product_id": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.65.1.aarch64",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.65.1.aarch64",
"product_id": "xorg-x11-server-source-1.19.6-10.65.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.65.1.i586",
"product": {
"name": "xorg-x11-server-1.19.6-10.65.1.i586",
"product_id": "xorg-x11-server-1.19.6-10.65.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.65.1.i586",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.i586",
"product_id": "xorg-x11-server-extra-1.19.6-10.65.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.i586",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.i586",
"product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.65.1.i586",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.65.1.i586",
"product_id": "xorg-x11-server-source-1.19.6-10.65.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.65.1.ppc64le",
"product": {
"name": "xorg-x11-server-1.19.6-10.65.1.ppc64le",
"product_id": "xorg-x11-server-1.19.6-10.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"product_id": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.65.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.65.1.ppc64le",
"product_id": "xorg-x11-server-source-1.19.6-10.65.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.65.1.s390",
"product": {
"name": "xorg-x11-server-1.19.6-10.65.1.s390",
"product_id": "xorg-x11-server-1.19.6-10.65.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.65.1.s390",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.s390",
"product_id": "xorg-x11-server-extra-1.19.6-10.65.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390",
"product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.s390"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.65.1.s390",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.65.1.s390",
"product_id": "xorg-x11-server-source-1.19.6-10.65.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.65.1.s390x",
"product": {
"name": "xorg-x11-server-1.19.6-10.65.1.s390x",
"product_id": "xorg-x11-server-1.19.6-10.65.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"product_id": "xorg-x11-server-extra-1.19.6-10.65.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.65.1.s390x",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.65.1.s390x",
"product_id": "xorg-x11-server-source-1.19.6-10.65.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.19.6-10.65.1.x86_64",
"product": {
"name": "xorg-x11-server-1.19.6-10.65.1.x86_64",
"product_id": "xorg-x11-server-1.19.6-10.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"product_id": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64",
"product_id": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.19.6-10.65.1.x86_64",
"product": {
"name": "xorg-x11-server-source-1.19.6-10.65.1.x86_64",
"product_id": "xorg-x11-server-source-1.19.6-10.65.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.19.6-10.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64"
},
"product_reference": "xorg-x11-server-1.19.6-10.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.19.6-10.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x"
},
"product_reference": "xorg-x11-server-1.19.6-10.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64"
},
"product_reference": "xorg-x11-server-1.19.6-10.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64"
},
"product_reference": "xorg-x11-server-1.19.6-10.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.19.6-10.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x"
},
"product_reference": "xorg-x11-server-1.19.6-10.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64"
},
"product_reference": "xorg-x11-server-1.19.6-10.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6816"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6816",
"url": "https://www.suse.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "SUSE Bug 1218582 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:30:32Z",
"details": "important"
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0229"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0229",
"url": "https://www.suse.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "SUSE Bug 1218583 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:30:32Z",
"details": "important"
}
],
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-21885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21885"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21885",
"url": "https://www.suse.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "SUSE Bug 1218584 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:30:32Z",
"details": "important"
}
],
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21886"
}
],
"notes": [
{
"category": "general",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21886",
"url": "https://www.suse.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "SUSE Bug 1218585 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.65.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:30:32Z",
"details": "important"
}
],
"title": "CVE-2024-21886"
}
]
}
suse-su-2024:0114-1
Vulnerability from csaf_suse
Published
2024-01-16 12:29
Modified
2024-01-16 12:29
Summary
Security update for xwayland
Notes
Title of the patch
Security update for xwayland
Description of the patch
This update for xwayland fixes the following issues:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Patchnames
SUSE-2024-114,SUSE-SLE-Product-WE-15-SP5-2024-114,openSUSE-SLE-15.5-2024-114
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xwayland",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xwayland fixes the following issues:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-114,SUSE-SLE-Product-WE-15-SP5-2024-114,openSUSE-SLE-15.5-2024-114",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0114-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0114-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240114-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0114-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html"
},
{
"category": "self",
"summary": "SUSE Bug 1218582",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "self",
"summary": "SUSE Bug 1218583",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "self",
"summary": "SUSE Bug 1218584",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "self",
"summary": "SUSE Bug 1218585",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6816 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0229 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21886/"
}
],
"title": "Security update for xwayland",
"tracking": {
"current_release_date": "2024-01-16T12:29:41Z",
"generator": {
"date": "2024-01-16T12:29:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0114-1",
"initial_release_date": "2024-01-16T12:29:41Z",
"revision_history": [
{
"date": "2024-01-16T12:29:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-22.1.5-150500.7.14.1.aarch64",
"product": {
"name": "xwayland-22.1.5-150500.7.14.1.aarch64",
"product_id": "xwayland-22.1.5-150500.7.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"product": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"product_id": "xwayland-devel-22.1.5-150500.7.14.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-22.1.5-150500.7.14.1.i586",
"product": {
"name": "xwayland-22.1.5-150500.7.14.1.i586",
"product_id": "xwayland-22.1.5-150500.7.14.1.i586"
}
},
{
"category": "product_version",
"name": "xwayland-devel-22.1.5-150500.7.14.1.i586",
"product": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.i586",
"product_id": "xwayland-devel-22.1.5-150500.7.14.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-22.1.5-150500.7.14.1.ppc64le",
"product": {
"name": "xwayland-22.1.5-150500.7.14.1.ppc64le",
"product_id": "xwayland-22.1.5-150500.7.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"product": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"product_id": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-22.1.5-150500.7.14.1.s390x",
"product": {
"name": "xwayland-22.1.5-150500.7.14.1.s390x",
"product_id": "xwayland-22.1.5-150500.7.14.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-22.1.5-150500.7.14.1.s390x",
"product": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.s390x",
"product_id": "xwayland-devel-22.1.5-150500.7.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-22.1.5-150500.7.14.1.x86_64",
"product": {
"name": "xwayland-22.1.5-150500.7.14.1.x86_64",
"product_id": "xwayland-22.1.5-150500.7.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-22.1.5-150500.7.14.1.x86_64",
"product": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.x86_64",
"product_id": "xwayland-devel-22.1.5-150500.7.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-22.1.5-150500.7.14.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64"
},
"product_reference": "xwayland-22.1.5-150500.7.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-22.1.5-150500.7.14.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64"
},
"product_reference": "xwayland-22.1.5-150500.7.14.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-22.1.5-150500.7.14.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le"
},
"product_reference": "xwayland-22.1.5-150500.7.14.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-22.1.5-150500.7.14.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x"
},
"product_reference": "xwayland-22.1.5-150500.7.14.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-22.1.5-150500.7.14.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64"
},
"product_reference": "xwayland-22.1.5-150500.7.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64"
},
"product_reference": "xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le"
},
"product_reference": "xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x"
},
"product_reference": "xwayland-devel-22.1.5-150500.7.14.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-devel-22.1.5-150500.7.14.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
},
"product_reference": "xwayland-devel-22.1.5-150500.7.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6816"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6816",
"url": "https://www.suse.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "SUSE Bug 1218582 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:29:41Z",
"details": "important"
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0229"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0229",
"url": "https://www.suse.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "SUSE Bug 1218583 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:29:41Z",
"details": "important"
}
],
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-21885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21885"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21885",
"url": "https://www.suse.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "SUSE Bug 1218584 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:29:41Z",
"details": "important"
}
],
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21886"
}
],
"notes": [
{
"category": "general",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21886",
"url": "https://www.suse.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "SUSE Bug 1218585 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-22.1.5-150500.7.14.1.x86_64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.aarch64",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.ppc64le",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.s390x",
"openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:29:41Z",
"details": "important"
}
],
"title": "CVE-2024-21886"
}
]
}
suse-su-2024:0111-1
Vulnerability from csaf_suse
Published
2024-01-16 12:28
Modified
2024-01-16 12:28
Summary
Security update for xorg-x11-server
Notes
Title of the patch
Security update for xorg-x11-server
Description of the patch
This update for xorg-x11-server fixes the following issues:
Security fixes:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Other:
- Fix vmware graphics driver crash (bsc#1218176)
- Fix xserver crash when Xinerama is enabled (bsc#1218240)
Patchnames
SUSE-2024-111,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-111,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-111,SUSE-SLE-Product-RT-15-SP4-2024-111,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-111,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-111,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-111,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-111,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-111
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\nSecurity fixes:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n\nOther:\n\n- Fix vmware graphics driver crash (bsc#1218176)\n- Fix xserver crash when Xinerama is enabled (bsc#1218240)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-111,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-111,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-111,SUSE-SLE-Product-RT-15-SP4-2024-111,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-111,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-111,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-111,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-111,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-111",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0111-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0111-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240111-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0111-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html"
},
{
"category": "self",
"summary": "SUSE Bug 1218176",
"url": "https://bugzilla.suse.com/1218176"
},
{
"category": "self",
"summary": "SUSE Bug 1218240",
"url": "https://bugzilla.suse.com/1218240"
},
{
"category": "self",
"summary": "SUSE Bug 1218582",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "self",
"summary": "SUSE Bug 1218583",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "self",
"summary": "SUSE Bug 1218584",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "self",
"summary": "SUSE Bug 1218585",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6816 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0229 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21886/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2024-01-16T12:28:57Z",
"generator": {
"date": "2024-01-16T12:28:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0111-1",
"initial_release_date": "2024-01-16T12:28:57Z",
"revision_history": [
{
"date": "2024-01-16T12:28:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"product_id": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.aarch64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.aarch64",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.40.1.i586",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.i586",
"product_id": "xorg-x11-server-1.20.3-150400.38.40.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.i586",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.i586",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.i586",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.i586",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.i586",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.i586",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"product_id": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.ppc64le",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"product_id": "xorg-x11-server-1.20.3-150400.38.40.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.s390x",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.s390x",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"product": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"product_id": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"product_id": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"product_id": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.x86_64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150400.38.40.1.x86_64",
"product_id": "xorg-x11-server-source-1.20.3-150400.38.40.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 15 SP4",
"product_id": "SUSE Linux Enterprise Real Time 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_rt:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP4",
"product_id": "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP4",
"product_id": "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP4",
"product_id": "SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6816"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6816",
"url": "https://www.suse.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "SUSE Bug 1218582 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:28:57Z",
"details": "important"
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0229"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0229",
"url": "https://www.suse.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "SUSE Bug 1218583 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:28:57Z",
"details": "important"
}
],
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-21885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21885"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21885",
"url": "https://www.suse.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "SUSE Bug 1218584 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:28:57Z",
"details": "important"
}
],
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21886"
}
],
"notes": [
{
"category": "general",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21886",
"url": "https://www.suse.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "SUSE Bug 1218585 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Real Time 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.40.1.x86_64",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.ppc64le",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.s390x",
"SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:28:57Z",
"details": "important"
}
],
"title": "CVE-2024-21886"
}
]
}
suse-su-2024:0165-1
Vulnerability from csaf_suse
Published
2024-01-19 11:55
Modified
2024-01-19 11:55
Summary
Security update for xwayland
Notes
Title of the patch
Security update for xwayland
Description of the patch
This update for xwayland fixes the following issues:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-0408: Fixed SELinux unlabeled GLX PBuffer. (bsc#1218845)
- CVE-2024-0409: Fixed SELinux context corruption. (bsc#1218846)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Patchnames
SUSE-2024-165,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-165
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xwayland",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xwayland fixes the following issues:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-0408: Fixed SELinux unlabeled GLX PBuffer. (bsc#1218845)\n - CVE-2024-0409: Fixed SELinux context corruption. (bsc#1218846) \n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-165,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-165",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0165-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0165-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240165-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0165-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html"
},
{
"category": "self",
"summary": "SUSE Bug 1218582",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "self",
"summary": "SUSE Bug 1218583",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "self",
"summary": "SUSE Bug 1218584",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "self",
"summary": "SUSE Bug 1218585",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "self",
"summary": "SUSE Bug 1218845",
"url": "https://bugzilla.suse.com/1218845"
},
{
"category": "self",
"summary": "SUSE Bug 1218846",
"url": "https://bugzilla.suse.com/1218846"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6816 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0229 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0408 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0409 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21886/"
}
],
"title": "Security update for xwayland",
"tracking": {
"current_release_date": "2024-01-19T11:55:09Z",
"generator": {
"date": "2024-01-19T11:55:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0165-1",
"initial_release_date": "2024-01-19T11:55:09Z",
"revision_history": [
{
"date": "2024-01-19T11:55:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xwayland-21.1.4-150400.3.31.1.aarch64",
"product": {
"name": "xwayland-21.1.4-150400.3.31.1.aarch64",
"product_id": "xwayland-21.1.4-150400.3.31.1.aarch64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-21.1.4-150400.3.31.1.aarch64",
"product": {
"name": "xwayland-devel-21.1.4-150400.3.31.1.aarch64",
"product_id": "xwayland-devel-21.1.4-150400.3.31.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-21.1.4-150400.3.31.1.i586",
"product": {
"name": "xwayland-21.1.4-150400.3.31.1.i586",
"product_id": "xwayland-21.1.4-150400.3.31.1.i586"
}
},
{
"category": "product_version",
"name": "xwayland-devel-21.1.4-150400.3.31.1.i586",
"product": {
"name": "xwayland-devel-21.1.4-150400.3.31.1.i586",
"product_id": "xwayland-devel-21.1.4-150400.3.31.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-21.1.4-150400.3.31.1.ppc64le",
"product": {
"name": "xwayland-21.1.4-150400.3.31.1.ppc64le",
"product_id": "xwayland-21.1.4-150400.3.31.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xwayland-devel-21.1.4-150400.3.31.1.ppc64le",
"product": {
"name": "xwayland-devel-21.1.4-150400.3.31.1.ppc64le",
"product_id": "xwayland-devel-21.1.4-150400.3.31.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-21.1.4-150400.3.31.1.s390x",
"product": {
"name": "xwayland-21.1.4-150400.3.31.1.s390x",
"product_id": "xwayland-21.1.4-150400.3.31.1.s390x"
}
},
{
"category": "product_version",
"name": "xwayland-devel-21.1.4-150400.3.31.1.s390x",
"product": {
"name": "xwayland-devel-21.1.4-150400.3.31.1.s390x",
"product_id": "xwayland-devel-21.1.4-150400.3.31.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xwayland-21.1.4-150400.3.31.1.x86_64",
"product": {
"name": "xwayland-21.1.4-150400.3.31.1.x86_64",
"product_id": "xwayland-21.1.4-150400.3.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "xwayland-devel-21.1.4-150400.3.31.1.x86_64",
"product": {
"name": "xwayland-devel-21.1.4-150400.3.31.1.x86_64",
"product_id": "xwayland-devel-21.1.4-150400.3.31.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Desktop 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Desktop 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled-ltss:15:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xwayland-21.1.4-150400.3.31.1.x86_64 as component of SUSE Linux Enterprise Desktop 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
},
"product_reference": "xwayland-21.1.4-150400.3.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 15 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6816"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "Vulnerability description"
}
],
"product_status": {
"fixed": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6816",
"url": "https://www.suse.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "SUSE Bug 1218582 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1218582"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-19T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0229"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "Vulnerability description"
}
],
"product_status": {
"fixed": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0229",
"url": "https://www.suse.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "SUSE Bug 1218583 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1218583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-19T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-0408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0408"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.",
"title": "Vulnerability description"
}
],
"product_status": {
"fixed": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0408",
"url": "https://www.suse.com/security/cve/CVE-2024-0408"
},
{
"category": "external",
"summary": "SUSE Bug 1218845 for CVE-2024-0408",
"url": "https://bugzilla.suse.com/1218845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-19T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2024-0408"
},
{
"cve": "CVE-2024-0409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0409"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.",
"title": "Vulnerability description"
}
],
"product_status": {
"fixed": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0409",
"url": "https://www.suse.com/security/cve/CVE-2024-0409"
},
{
"category": "external",
"summary": "SUSE Bug 1218846 for CVE-2024-0409",
"url": "https://bugzilla.suse.com/1218846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-19T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2024-0409"
},
{
"cve": "CVE-2024-21885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21885"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "Vulnerability description"
}
],
"product_status": {
"fixed": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21885",
"url": "https://www.suse.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "SUSE Bug 1218584 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1218584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-19T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21886"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "Vulnerability description"
}
],
"product_status": {
"fixed": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21886",
"url": "https://www.suse.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "SUSE Bug 1218585 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1218585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 15 SP4-LTSS:xwayland-21.1.4-150400.3.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-19T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2024-21886"
}
]
}
suse-su-2024:0109-1
Vulnerability from csaf_suse
Published
2024-01-16 12:28
Modified
2024-01-16 12:28
Summary
Security update for xorg-x11-server
Notes
Title of the patch
Security update for xorg-x11-server
Description of the patch
This update for xorg-x11-server fixes the following issues:
Security fixes:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Other:
- Fix vmware graphics driver crash (bsc#1218176)
- Fix xserver crash when Xinerama is enabled (bsc#1218240)
Patchnames
SUSE-2024-109,SUSE-SLE-Module-Basesystem-15-SP5-2024-109,SUSE-SLE-Module-Development-Tools-15-SP5-2024-109,openSUSE-SLE-15.5-2024-109
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\nSecurity fixes:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n\nOther:\n\n- Fix vmware graphics driver crash (bsc#1218176)\n- Fix xserver crash when Xinerama is enabled (bsc#1218240)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-109,SUSE-SLE-Module-Basesystem-15-SP5-2024-109,SUSE-SLE-Module-Development-Tools-15-SP5-2024-109,openSUSE-SLE-15.5-2024-109",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0109-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0109-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240109-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0109-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html"
},
{
"category": "self",
"summary": "SUSE Bug 1218176",
"url": "https://bugzilla.suse.com/1218176"
},
{
"category": "self",
"summary": "SUSE Bug 1218240",
"url": "https://bugzilla.suse.com/1218240"
},
{
"category": "self",
"summary": "SUSE Bug 1218582",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "self",
"summary": "SUSE Bug 1218583",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "self",
"summary": "SUSE Bug 1218584",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "self",
"summary": "SUSE Bug 1218585",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6816 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0229 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21886/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2024-01-16T12:28:03Z",
"generator": {
"date": "2024-01-16T12:28:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0109-1",
"initial_release_date": "2024-01-16T12:28:03Z",
"revision_history": [
{
"date": "2024-01-16T12:28:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"product_id": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.18.1.i586",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.i586",
"product_id": "xorg-x11-server-21.1.4-150500.7.18.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.i586",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.i586",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.i586",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.i586",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.i586",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.i586",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.i586",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.i586",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"product_id": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"product_id": "xorg-x11-server-21.1.4-150500.7.18.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"product": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"product_id": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"product": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"product_id": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"product_id": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64",
"product": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64",
"product_id": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64"
},
"product_reference": "xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le"
},
"product_reference": "xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x"
},
"product_reference": "xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
},
"product_reference": "xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6816"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6816",
"url": "https://www.suse.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "SUSE Bug 1218582 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:28:03Z",
"details": "important"
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0229"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0229",
"url": "https://www.suse.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "SUSE Bug 1218583 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:28:03Z",
"details": "important"
}
],
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-21885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21885"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21885",
"url": "https://www.suse.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "SUSE Bug 1218584 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:28:03Z",
"details": "important"
}
],
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21886"
}
],
"notes": [
{
"category": "general",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21886",
"url": "https://www.suse.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "SUSE Bug 1218585 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1.x86_64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.aarch64",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.ppc64le",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.s390x",
"openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:28:03Z",
"details": "important"
}
],
"title": "CVE-2024-21886"
}
]
}
suse-su-2024:0121-1
Vulnerability from csaf_suse
Published
2024-01-16 12:33
Modified
2024-01-16 12:33
Summary
Security update for xorg-x11-server
Notes
Title of the patch
Security update for xorg-x11-server
Description of the patch
This update for xorg-x11-server fixes the following issues:
- CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
- CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
- CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
- CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
Patchnames
SUSE-2024-121,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-121,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-121,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-121,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-121,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-121,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-121,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-121,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-121,SUSE-SLE-Product-WE-15-SP5-2024-121,SUSE-Storage-7.1-2024-121
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xorg-x11-server",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xorg-x11-server fixes the following issues:\n\n - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)\n - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)\n - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)\n - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-121,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-121,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-121,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-121,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-121,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-121,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-121,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-121,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-121,SUSE-SLE-Product-WE-15-SP5-2024-121,SUSE-Storage-7.1-2024-121",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0121-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0121-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240121-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0121-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html"
},
{
"category": "self",
"summary": "SUSE Bug 1218582",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "self",
"summary": "SUSE Bug 1218583",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "self",
"summary": "SUSE Bug 1218584",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "self",
"summary": "SUSE Bug 1218585",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6816 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0229 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21886/"
}
],
"title": "Security update for xorg-x11-server",
"tracking": {
"current_release_date": "2024-01-16T12:33:53Z",
"generator": {
"date": "2024-01-16T12:33:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0121-1",
"initial_release_date": "2024-01-16T12:33:53Z",
"revision_history": [
{
"date": "2024-01-16T12:33:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.aarch64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.aarch64",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.aarch64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.aarch64",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.aarch64",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.i586",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.i586",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.i586",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.i586",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.i586",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.i586",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.i586",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.i586",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.i586"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.i586",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.i586",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.ppc64le",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.ppc64le",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.ppc64le",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.ppc64le",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.s390x",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.s390x",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.s390x"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.s390x",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.s390x",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"product": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"product_id": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"product": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"product": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.x86_64",
"product": {
"name": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.x86_64",
"product_id": "xorg-x11-server-source-1.20.3-150200.22.5.88.1.x86_64"
}
},
{
"category": "product_version",
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64",
"product": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64",
"product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64"
},
"product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6816"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6816",
"url": "https://www.suse.com/security/cve/CVE-2023-6816"
},
{
"category": "external",
"summary": "SUSE Bug 1218582 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1218582"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2023-6816",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:33:53Z",
"details": "important"
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0229"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0229",
"url": "https://www.suse.com/security/cve/CVE-2024-0229"
},
{
"category": "external",
"summary": "SUSE Bug 1218583 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1218583"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-0229",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:33:53Z",
"details": "important"
}
],
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-21885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21885"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21885",
"url": "https://www.suse.com/security/cve/CVE-2024-21885"
},
{
"category": "external",
"summary": "SUSE Bug 1218584 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1218584"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21885",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:33:53Z",
"details": "important"
}
],
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21886"
}
],
"notes": [
{
"category": "general",
"text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21886",
"url": "https://www.suse.com/security/cve/CVE-2024-21886"
},
{
"category": "external",
"summary": "SUSE Bug 1218585 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1218585"
},
{
"category": "external",
"summary": "SUSE Bug 1221590 for CVE-2024-21886",
"url": "https://bugzilla.suse.com/1221590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.88.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-01-16T12:33:53Z",
"details": "important"
}
],
"title": "CVE-2024-21886"
}
]
}
ghsa-pcjv-393q-rqf2
Vulnerability from github
Published
2024-01-18 06:30
Modified
2025-08-04 21:30
Severity ?
VLAI Severity ?
Details
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
{
"affected": [],
"aliases": [
"CVE-2023-6816"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-01-18T05:15:08Z",
"severity": "HIGH"
},
"details": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
"id": "GHSA-pcjv-393q-rqf2",
"modified": "2025-08-04T21:30:36Z",
"published": "2024-01-18T06:30:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240307-0006"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202401-30"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2023-6816"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:2170"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0558"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/01/18/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
wid-sec-w-2024-3195
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-10-15 22:00
Summary
Oracle Communications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Communications umfasst branchenspezifische Lösungen für die Telekommunikationsbranche.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3195 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3195.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3195 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3195"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Communications vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixCGBU"
}
],
"source_lang": "en-US",
"title": "Oracle Communications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-10-15T22:00:00.000+00:00",
"generator": {
"date": "2024-10-16T10:12:35.400+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3195",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9.1.1.3.0",
"product": {
"name": "Oracle Communications 9.1.1.3.0",
"product_id": "T027333",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.1.3.0"
}
}
},
{
"category": "product_version",
"name": "12.6.1.0.0",
"product": {
"name": "Oracle Communications 12.6.1.0.0",
"product_id": "T027338",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:12.6.1.0.0"
}
}
},
{
"category": "product_version",
"name": "5.1",
"product": {
"name": "Oracle Communications 5.1",
"product_id": "T028684",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.1"
}
}
},
{
"category": "product_version",
"name": "15.0.0.0.0",
"product": {
"name": "Oracle Communications 15.0.0.0.0",
"product_id": "T032090",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:15.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "23.4.0",
"product": {
"name": "Oracle Communications 23.4.0",
"product_id": "T032091",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.0"
}
}
},
{
"category": "product_version",
"name": "23.4.2",
"product": {
"name": "Oracle Communications 23.4.2",
"product_id": "T034144",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.2"
}
}
},
{
"category": "product_version",
"name": "24.1.0",
"product": {
"name": "Oracle Communications 24.1.0",
"product_id": "T034145",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.0"
}
}
},
{
"category": "product_version",
"name": "5.2",
"product": {
"name": "Oracle Communications 5.2",
"product_id": "T034146",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.2"
}
}
},
{
"category": "product_version",
"name": "24.1.0.0.0",
"product": {
"name": "Oracle Communications 24.1.0.0.0",
"product_id": "T034147",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "23.4.3",
"product": {
"name": "Oracle Communications 23.4.3",
"product_id": "T036195",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.3"
}
}
},
{
"category": "product_version",
"name": "23.4.4",
"product": {
"name": "Oracle Communications 23.4.4",
"product_id": "T036196",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.0",
"product": {
"name": "Oracle Communications \u003c=24.2.0",
"product_id": "T036197"
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.0",
"product": {
"name": "Oracle Communications \u003c=24.2.0",
"product_id": "T036197-fixed"
}
},
{
"category": "product_version",
"name": "4.1.0",
"product": {
"name": "Oracle Communications 4.1.0",
"product_id": "T036205",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.1.0"
}
}
},
{
"category": "product_version",
"name": "4.2.0",
"product": {
"name": "Oracle Communications 4.2.0",
"product_id": "T036206",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.2.0"
}
}
},
{
"category": "product_version",
"name": "9.2.0",
"product": {
"name": "Oracle Communications 9.2.0",
"product_id": "T036207",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.2.0"
}
}
},
{
"category": "product_version",
"name": "9.3.0",
"product": {
"name": "Oracle Communications 9.3.0",
"product_id": "T036208",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.3.0"
}
}
},
{
"category": "product_version",
"name": "12.11.0",
"product": {
"name": "Oracle Communications 12.11.0",
"product_id": "T036209",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:12.11.0"
}
}
},
{
"category": "product_version",
"name": "9.0.1.10.0",
"product": {
"name": "Oracle Communications 9.0.1.10.0",
"product_id": "T038373",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.0.1.10.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.5",
"product": {
"name": "Oracle Communications \u003c=23.4.5",
"product_id": "T038375"
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.5",
"product": {
"name": "Oracle Communications \u003c=23.4.5",
"product_id": "T038375-fixed"
}
},
{
"category": "product_version",
"name": "24.2.1",
"product": {
"name": "Oracle Communications 24.2.1",
"product_id": "T038376",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.6",
"product": {
"name": "Oracle Communications \u003c=23.4.6",
"product_id": "T038377"
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.6",
"product": {
"name": "Oracle Communications \u003c=23.4.6",
"product_id": "T038377-fixed"
}
},
{
"category": "product_version",
"name": "24.1.1",
"product": {
"name": "Oracle Communications 24.1.1",
"product_id": "T038378",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.1"
}
}
},
{
"category": "product_version",
"name": "24.2.2",
"product": {
"name": "Oracle Communications 24.2.2",
"product_id": "T038379",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.2"
}
}
},
{
"category": "product_version",
"name": "9.1.5",
"product": {
"name": "Oracle Communications 9.1.5",
"product_id": "T038380",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.5"
}
}
},
{
"category": "product_version",
"name": "9.1.0",
"product": {
"name": "Oracle Communications 9.1.0",
"product_id": "T038381",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.0"
}
}
},
{
"category": "product_version",
"name": "14",
"product": {
"name": "Oracle Communications 14.0",
"product_id": "T038382",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:14.0"
}
}
},
{
"category": "product_version",
"name": "9.1.1.9.0",
"product": {
"name": "Oracle Communications 9.1.1.9.0",
"product_id": "T038383",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.1.9.0"
}
}
},
{
"category": "product_version",
"name": "14.0.0.1",
"product": {
"name": "Oracle Communications 14.0.0.1",
"product_id": "T038384",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:14.0.0.1"
}
}
},
{
"category": "product_version",
"name": "17.0.1",
"product": {
"name": "Oracle Communications 17.0.1",
"product_id": "T038385",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:17.0.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.4.0.4",
"product": {
"name": "Oracle Communications \u003c10.4.0.4",
"product_id": "T038386"
}
},
{
"category": "product_version",
"name": "10.4.0.4",
"product": {
"name": "Oracle Communications 10.4.0.4",
"product_id": "T038386-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:10.4.0.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8.0",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8.0",
"product_id": "T038426"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8.0",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8.0",
"product_id": "T038426-fixed"
}
}
],
"category": "product_name",
"name": "Communications"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-23437",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-23437"
},
{
"cve": "CVE-2022-2601",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2023-2953",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-2953"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-38408",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-4043",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-46136",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-46136"
},
{
"cve": "CVE-2023-48795",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51775",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2023-5685",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-6597",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-6816",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0450",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-22020",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22257",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-23672",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-23672"
},
{
"cve": "CVE-2024-2398",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-25062",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-25638",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-26308",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-28182",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29736",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29736"
},
{
"cve": "CVE-2024-29857",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-30251",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-30251"
},
{
"cve": "CVE-2024-31080",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-31080"
},
{
"cve": "CVE-2024-31744",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-31744"
},
{
"cve": "CVE-2024-32760",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-33602",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34750",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38816",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-40898",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-43044",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-45492",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-4577",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-5971",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5971"
},
{
"cve": "CVE-2024-6162",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6387",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-7254",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-7254"
}
]
}
WID-SEC-W-2024-0127
Vulnerability from csaf_certbund
Published
2024-01-16 23:00
Modified
2025-08-04 22:00
Summary
X.Org X11: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das X Window System dient der Erzeugung grafischer Oberflächen auf Unix Systemen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0127 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0127.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0127 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0127"
},
{
"category": "external",
"summary": "X.Org Security Advisory vom 2024-01-16",
"url": "https://lists.x.org/archives/xorg/2024-January/061525.html"
},
{
"category": "external",
"summary": "Xming Changes vom 2024-01-16",
"url": "http://www.straightrunning.com/XmingNotes/changes.php"
},
{
"category": "external",
"summary": "Ubuntu Security Advisory vom 2024-01-16",
"url": "https://ubuntu.com/security/notices/USN-6587-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory vom 2024-01-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-05db4bcbec"
},
{
"category": "external",
"summary": "Fedora Security Advisory vom 2024-01-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-da3d410b53"
},
{
"category": "external",
"summary": "OpenBSD Patch vom 2024-01-16",
"url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/012_xserver.patch.sig"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0111-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0116-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-5762D637DD vom 2024-01-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5762d637dd"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0121-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0114-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0109-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-2815D55CDF vom 2024-01-19",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2815d55cdf"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0165-1 vom 2024-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0320 vom 2024-01-22",
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0320 vom 2024-01-23",
"url": "https://linux.oracle.com/errata/ELSA-2024-0320.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6587-2 vom 2024-01-22",
"url": "https://ubuntu.com/security/notices/USN-6587-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5603 vom 2024-01-23",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00010.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0212-1 vom 2024-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0236-1 vom 2024-01-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3721 vom 2024-01-25",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2024:0320 vom 2024-01-26",
"url": "https://lists.centos.org/pipermail/centos-announce/2024-January/099216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0249-1 vom 2024-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0251-1 vom 2024-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0252-1 vom 2024-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0558 vom 2024-01-30",
"url": "http://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0597 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0557 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0614 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0607 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6587-3 vom 2024-01-30",
"url": "https://ubuntu.com/security/notices/USN-6587-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0617 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0621 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0626 vom 2024-01-31",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202401-30 vom 2024-01-31",
"url": "https://security.gentoo.org/glsa/202401-30"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0557 vom 2024-01-31",
"url": "https://linux.oracle.com/errata/ELSA-2024-0557.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0629 vom 2024-01-31",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0607 vom 2024-02-01",
"url": "http://linux.oracle.com/errata/ELSA-2024-0607.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0629 vom 2024-02-01",
"url": "https://linux.oracle.com/errata/ELSA-2024-0629.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6587-4 vom 2024-02-01",
"url": "https://ubuntu.com/security/notices/USN-6587-4"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2024:0629 vom 2024-02-05",
"url": "https://lists.centos.org/pipermail/centos-announce/2024-February/099223.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:0607 vom 2024-02-12",
"url": "https://errata.build.resf.org/RLSA-2024:0607"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2455 vom 2024-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2455.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6587-5 vom 2024-03-13",
"url": "https://ubuntu.com/security/notices/USN-6587-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2037 vom 2024-04-25",
"url": "http://linux.oracle.com/errata/ELSA-2024-2037.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2080 vom 2024-04-30",
"url": "https://linux.oracle.com/errata/ELSA-2024-2080.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2169 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2995 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2995"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2996 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-1932 vom 2024-06-28",
"url": "https://alas.aws.amazon.com/ALAS-2024-1932.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2861 vom 2025-04-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-2861.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12751 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"source_lang": "en-US",
"title": "X.Org X11: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-04T22:00:00.000+00:00",
"generator": {
"date": "2025-08-05T07:19:26.027+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-0127",
"initial_release_date": "2024-01-16T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-01-16T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-17T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE und Fedora aufgenommen"
},
{
"date": "2024-01-18T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-01-21T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-23T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-01-24T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-01-25T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2024-01-28T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von CentOS und SUSE aufgenommen"
},
{
"date": "2024-01-29T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-30T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-01-31T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Gentoo, Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2024-02-01T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-02-05T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2024-02-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-02-19T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-03-13T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-04-24T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-30T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "23"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c21.1.11",
"product": {
"name": "Open Source X.Org X11 \u003c21.1.11",
"product_id": "T032211"
}
},
{
"category": "product_version",
"name": "21.1.11",
"product": {
"name": "Open Source X.Org X11 21.1.11",
"product_id": "T032211-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:x:x.org_x11:21.1.11"
}
}
},
{
"category": "product_version_range",
"name": "\u003cXWayland 23.2.4",
"product": {
"name": "Open Source X.Org X11 \u003cXWayland 23.2.4",
"product_id": "T032212"
}
},
{
"category": "product_version",
"name": "XWayland 23.2.4",
"product": {
"name": "Open Source X.Org X11 XWayland 23.2.4",
"product_id": "T032212-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:x:x.org_x11:xwayland_23.2.4"
}
}
}
],
"category": "product_name",
"name": "X.Org X11"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "OpenBSD OpenBSD",
"product": {
"name": "OpenBSD OpenBSD",
"product_id": "T024283",
"product_identification_helper": {
"cpe": "cpe:/a:openbsd:openbsd:-"
}
}
}
],
"category": "vendor",
"name": "OpenBSD"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
},
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T016400",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-0408",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-0408"
},
{
"cve": "CVE-2024-0409",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-0409"
},
{
"cve": "CVE-2024-21885",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-21886"
}
]
}
wid-sec-w-2024-0127
Vulnerability from csaf_certbund
Published
2024-01-16 23:00
Modified
2025-08-04 22:00
Summary
X.Org X11: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das X Window System dient der Erzeugung grafischer Oberflächen auf Unix Systemen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0127 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0127.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0127 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0127"
},
{
"category": "external",
"summary": "X.Org Security Advisory vom 2024-01-16",
"url": "https://lists.x.org/archives/xorg/2024-January/061525.html"
},
{
"category": "external",
"summary": "Xming Changes vom 2024-01-16",
"url": "http://www.straightrunning.com/XmingNotes/changes.php"
},
{
"category": "external",
"summary": "Ubuntu Security Advisory vom 2024-01-16",
"url": "https://ubuntu.com/security/notices/USN-6587-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory vom 2024-01-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-05db4bcbec"
},
{
"category": "external",
"summary": "Fedora Security Advisory vom 2024-01-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-da3d410b53"
},
{
"category": "external",
"summary": "OpenBSD Patch vom 2024-01-16",
"url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/012_xserver.patch.sig"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0111-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0116-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-5762D637DD vom 2024-01-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5762d637dd"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0121-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0114-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0109-1 vom 2024-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-2815D55CDF vom 2024-01-19",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2815d55cdf"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0165-1 vom 2024-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0320 vom 2024-01-22",
"url": "https://access.redhat.com/errata/RHSA-2024:0320"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0320 vom 2024-01-23",
"url": "https://linux.oracle.com/errata/ELSA-2024-0320.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6587-2 vom 2024-01-22",
"url": "https://ubuntu.com/security/notices/USN-6587-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5603 vom 2024-01-23",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00010.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0212-1 vom 2024-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0236-1 vom 2024-01-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3721 vom 2024-01-25",
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2024:0320 vom 2024-01-26",
"url": "https://lists.centos.org/pipermail/centos-announce/2024-January/099216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0249-1 vom 2024-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0251-1 vom 2024-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0252-1 vom 2024-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0558 vom 2024-01-30",
"url": "http://access.redhat.com/errata/RHSA-2024:0558"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0597 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0597"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0557 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0557"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0614 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0614"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0607 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0607"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6587-3 vom 2024-01-30",
"url": "https://ubuntu.com/security/notices/USN-6587-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0617 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0617"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0621 vom 2024-01-30",
"url": "https://access.redhat.com/errata/RHSA-2024:0621"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0626 vom 2024-01-31",
"url": "https://access.redhat.com/errata/RHSA-2024:0626"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202401-30 vom 2024-01-31",
"url": "https://security.gentoo.org/glsa/202401-30"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0557 vom 2024-01-31",
"url": "https://linux.oracle.com/errata/ELSA-2024-0557.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0629 vom 2024-01-31",
"url": "https://access.redhat.com/errata/RHSA-2024:0629"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0607 vom 2024-02-01",
"url": "http://linux.oracle.com/errata/ELSA-2024-0607.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-0629 vom 2024-02-01",
"url": "https://linux.oracle.com/errata/ELSA-2024-0629.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6587-4 vom 2024-02-01",
"url": "https://ubuntu.com/security/notices/USN-6587-4"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2024:0629 vom 2024-02-05",
"url": "https://lists.centos.org/pipermail/centos-announce/2024-February/099223.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:0607 vom 2024-02-12",
"url": "https://errata.build.resf.org/RLSA-2024:0607"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2455 vom 2024-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2455.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6587-5 vom 2024-03-13",
"url": "https://ubuntu.com/security/notices/USN-6587-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2037 vom 2024-04-25",
"url": "http://linux.oracle.com/errata/ELSA-2024-2037.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2080 vom 2024-04-30",
"url": "https://linux.oracle.com/errata/ELSA-2024-2080.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2169 vom 2024-04-30",
"url": "https://access.redhat.com/errata/RHSA-2024:2169"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2995 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2995"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2996 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2996"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-1932 vom 2024-06-28",
"url": "https://alas.aws.amazon.com/ALAS-2024-1932.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2861 vom 2025-04-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-2861.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12751 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12751"
}
],
"source_lang": "en-US",
"title": "X.Org X11: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-04T22:00:00.000+00:00",
"generator": {
"date": "2025-08-05T07:19:26.027+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-0127",
"initial_release_date": "2024-01-16T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-01-16T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-17T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE und Fedora aufgenommen"
},
{
"date": "2024-01-18T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-01-21T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-23T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-01-24T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-01-25T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2024-01-28T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von CentOS und SUSE aufgenommen"
},
{
"date": "2024-01-29T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-30T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-01-31T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Gentoo, Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2024-02-01T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-02-05T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2024-02-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-02-19T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-03-13T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-04-24T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-30T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "23"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c21.1.11",
"product": {
"name": "Open Source X.Org X11 \u003c21.1.11",
"product_id": "T032211"
}
},
{
"category": "product_version",
"name": "21.1.11",
"product": {
"name": "Open Source X.Org X11 21.1.11",
"product_id": "T032211-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:x:x.org_x11:21.1.11"
}
}
},
{
"category": "product_version_range",
"name": "\u003cXWayland 23.2.4",
"product": {
"name": "Open Source X.Org X11 \u003cXWayland 23.2.4",
"product_id": "T032212"
}
},
{
"category": "product_version",
"name": "XWayland 23.2.4",
"product": {
"name": "Open Source X.Org X11 XWayland 23.2.4",
"product_id": "T032212-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:x:x.org_x11:xwayland_23.2.4"
}
}
}
],
"category": "product_name",
"name": "X.Org X11"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "OpenBSD OpenBSD",
"product": {
"name": "OpenBSD OpenBSD",
"product_id": "T024283",
"product_identification_helper": {
"cpe": "cpe:/a:openbsd:openbsd:-"
}
}
}
],
"category": "vendor",
"name": "OpenBSD"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
},
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T016400",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0229",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-0229"
},
{
"cve": "CVE-2024-0408",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-0408"
},
{
"cve": "CVE-2024-0409",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-0409"
},
{
"cve": "CVE-2024-21885",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-21885"
},
{
"cve": "CVE-2024-21886",
"product_status": {
"known_affected": [
"T024283",
"T032212",
"67646",
"T012167",
"T004914",
"T016400",
"T032255",
"T032211",
"74185",
"2951",
"T002207",
"T000126",
"398363",
"1727"
]
},
"release_date": "2024-01-16T23:00:00.000+00:00",
"title": "CVE-2024-21886"
}
]
}
WID-SEC-W-2024-3195
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-10-15 22:00
Summary
Oracle Communications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Communications umfasst branchenspezifische Lösungen für die Telekommunikationsbranche.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3195 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3195.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3195 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3195"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Communications vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixCGBU"
}
],
"source_lang": "en-US",
"title": "Oracle Communications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-10-15T22:00:00.000+00:00",
"generator": {
"date": "2024-10-16T10:12:35.400+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3195",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9.1.1.3.0",
"product": {
"name": "Oracle Communications 9.1.1.3.0",
"product_id": "T027333",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.1.3.0"
}
}
},
{
"category": "product_version",
"name": "12.6.1.0.0",
"product": {
"name": "Oracle Communications 12.6.1.0.0",
"product_id": "T027338",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:12.6.1.0.0"
}
}
},
{
"category": "product_version",
"name": "5.1",
"product": {
"name": "Oracle Communications 5.1",
"product_id": "T028684",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.1"
}
}
},
{
"category": "product_version",
"name": "15.0.0.0.0",
"product": {
"name": "Oracle Communications 15.0.0.0.0",
"product_id": "T032090",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:15.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "23.4.0",
"product": {
"name": "Oracle Communications 23.4.0",
"product_id": "T032091",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.0"
}
}
},
{
"category": "product_version",
"name": "23.4.2",
"product": {
"name": "Oracle Communications 23.4.2",
"product_id": "T034144",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.2"
}
}
},
{
"category": "product_version",
"name": "24.1.0",
"product": {
"name": "Oracle Communications 24.1.0",
"product_id": "T034145",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.0"
}
}
},
{
"category": "product_version",
"name": "5.2",
"product": {
"name": "Oracle Communications 5.2",
"product_id": "T034146",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.2"
}
}
},
{
"category": "product_version",
"name": "24.1.0.0.0",
"product": {
"name": "Oracle Communications 24.1.0.0.0",
"product_id": "T034147",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "23.4.3",
"product": {
"name": "Oracle Communications 23.4.3",
"product_id": "T036195",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.3"
}
}
},
{
"category": "product_version",
"name": "23.4.4",
"product": {
"name": "Oracle Communications 23.4.4",
"product_id": "T036196",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.0",
"product": {
"name": "Oracle Communications \u003c=24.2.0",
"product_id": "T036197"
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.0",
"product": {
"name": "Oracle Communications \u003c=24.2.0",
"product_id": "T036197-fixed"
}
},
{
"category": "product_version",
"name": "4.1.0",
"product": {
"name": "Oracle Communications 4.1.0",
"product_id": "T036205",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.1.0"
}
}
},
{
"category": "product_version",
"name": "4.2.0",
"product": {
"name": "Oracle Communications 4.2.0",
"product_id": "T036206",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.2.0"
}
}
},
{
"category": "product_version",
"name": "9.2.0",
"product": {
"name": "Oracle Communications 9.2.0",
"product_id": "T036207",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.2.0"
}
}
},
{
"category": "product_version",
"name": "9.3.0",
"product": {
"name": "Oracle Communications 9.3.0",
"product_id": "T036208",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.3.0"
}
}
},
{
"category": "product_version",
"name": "12.11.0",
"product": {
"name": "Oracle Communications 12.11.0",
"product_id": "T036209",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:12.11.0"
}
}
},
{
"category": "product_version",
"name": "9.0.1.10.0",
"product": {
"name": "Oracle Communications 9.0.1.10.0",
"product_id": "T038373",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.0.1.10.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.5",
"product": {
"name": "Oracle Communications \u003c=23.4.5",
"product_id": "T038375"
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.5",
"product": {
"name": "Oracle Communications \u003c=23.4.5",
"product_id": "T038375-fixed"
}
},
{
"category": "product_version",
"name": "24.2.1",
"product": {
"name": "Oracle Communications 24.2.1",
"product_id": "T038376",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.6",
"product": {
"name": "Oracle Communications \u003c=23.4.6",
"product_id": "T038377"
}
},
{
"category": "product_version_range",
"name": "\u003c=23.4.6",
"product": {
"name": "Oracle Communications \u003c=23.4.6",
"product_id": "T038377-fixed"
}
},
{
"category": "product_version",
"name": "24.1.1",
"product": {
"name": "Oracle Communications 24.1.1",
"product_id": "T038378",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.1"
}
}
},
{
"category": "product_version",
"name": "24.2.2",
"product": {
"name": "Oracle Communications 24.2.2",
"product_id": "T038379",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.2"
}
}
},
{
"category": "product_version",
"name": "9.1.5",
"product": {
"name": "Oracle Communications 9.1.5",
"product_id": "T038380",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.5"
}
}
},
{
"category": "product_version",
"name": "9.1.0",
"product": {
"name": "Oracle Communications 9.1.0",
"product_id": "T038381",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.0"
}
}
},
{
"category": "product_version",
"name": "14",
"product": {
"name": "Oracle Communications 14.0",
"product_id": "T038382",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:14.0"
}
}
},
{
"category": "product_version",
"name": "9.1.1.9.0",
"product": {
"name": "Oracle Communications 9.1.1.9.0",
"product_id": "T038383",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.1.1.9.0"
}
}
},
{
"category": "product_version",
"name": "14.0.0.1",
"product": {
"name": "Oracle Communications 14.0.0.1",
"product_id": "T038384",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:14.0.0.1"
}
}
},
{
"category": "product_version",
"name": "17.0.1",
"product": {
"name": "Oracle Communications 17.0.1",
"product_id": "T038385",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:17.0.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.4.0.4",
"product": {
"name": "Oracle Communications \u003c10.4.0.4",
"product_id": "T038386"
}
},
{
"category": "product_version",
"name": "10.4.0.4",
"product": {
"name": "Oracle Communications 10.4.0.4",
"product_id": "T038386-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:10.4.0.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8.0",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8.0",
"product_id": "T038426"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8.0",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8.0",
"product_id": "T038426-fixed"
}
}
],
"category": "product_name",
"name": "Communications"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-23437",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-23437"
},
{
"cve": "CVE-2022-2601",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2023-2953",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-2953"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-38408",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-4043",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-46136",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-46136"
},
{
"cve": "CVE-2023-48795",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51775",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2023-5685",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-6597",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-6816",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2024-0450",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-22020",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22257",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-23672",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-23672"
},
{
"cve": "CVE-2024-2398",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-25062",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-25638",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-26308",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-28182",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29736",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29736"
},
{
"cve": "CVE-2024-29857",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-30251",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-30251"
},
{
"cve": "CVE-2024-31080",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-31080"
},
{
"cve": "CVE-2024-31744",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-31744"
},
{
"cve": "CVE-2024-32760",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-33602",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34750",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38816",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-40898",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-43044",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-45492",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-4577",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-5971",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5971"
},
{
"cve": "CVE-2024-6162",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6387",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-7254",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036209",
"T036205",
"T036206",
"T036207",
"T036208",
"T034147",
"T038386",
"T034146",
"T034145",
"T034144",
"T038382",
"T038383",
"T038384",
"T038385",
"T038380",
"T038381",
"T027338",
"T027333",
"T028684",
"T038379",
"T038376",
"T038378",
"T036195",
"T038373",
"T036196",
"T032090",
"T032091"
],
"last_affected": [
"T038426",
"T036197",
"T038375",
"T038377"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-7254"
}
]
}
NCSC-2024-0414
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:17
Modified
2024-10-17 13:17
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van gegevens
- Uitvoer van willekeurige code (Gebruikersrechten)
- Uitvoer van willekeurige code (Administratorrechten)
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-122
Heap-based Buffer Overflow
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-20
Improper Input Validation
CWE-466
Return of Pointer Value Outside of Expected Range
CWE-606
Unchecked Input for Loop Condition
CWE-390
Detection of Error Condition Without Action
CWE-405
Asymmetric Resource Consumption (Amplification)
CWE-222
Truncation of Security-relevant Information
CWE-364
Signal Handler Race Condition
CWE-450
Multiple Interpretations of UI Input
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-772
Missing Release of Resource after Effective Lifetime
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-126
Buffer Over-read
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-703
Improper Check or Handling of Exceptional Conditions
CWE-427
Uncontrolled Search Path Element
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE-195
Signed to Unsigned Conversion Error
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-190
Integer Overflow or Wraparound
CWE-61
UNIX Symbolic Link (Symlink) Following
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-459
Incomplete Cleanup
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-248
Uncaught Exception
CWE-674
Uncontrolled Recursion
CWE-918
Server-Side Request Forgery (SSRF)
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van gegevens\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Signed to Unsigned Conversion Error",
"title": "CWE-195"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2024-10-17T13:17:52.103171Z",
"id": "NCSC-2024-0414",
"initial_release_date": "2024-10-17T13:17:52.103171Z",
"revision_history": [
{
"date": "2024-10-17T13:17:52.103171Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-204629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-1673475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1650734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-204639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-204627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
"product": {
"name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
"product_id": "CSAFPID-219835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management__-_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3.0.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-41194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-765241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-498607",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12:0.0.5.0:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_calendar_server",
"product": {
"name": "communications_calendar_server",
"product_id": "CSAFPID-764736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_calendar_server",
"product": {
"name": "communications_calendar_server",
"product_id": "CSAFPID-220190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_configuration_console",
"product": {
"name": "communications_cloud_native_configuration_console",
"product_id": "CSAFPID-391501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_configuration_console",
"product": {
"name": "communications_cloud_native_configuration_console",
"product_id": "CSAFPID-440102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-89545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-180215",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-180197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-41516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-41515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220057",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-2045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-40612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-608629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-93784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-41111",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-493445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-294401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-220547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-220459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611403",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-912066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1503323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-165550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-93546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-180195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-40299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-187447",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-45186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-45185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-220559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-220558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-764238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-764239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-764825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:22.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-180201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-760687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-40947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-93635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-503534",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-90018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-220327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-94290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-220325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-614513",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-643776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40613",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-2044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40301",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-180194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-449747",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-223527",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-449746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-503493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-260394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-618156",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1673473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0-24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-40611",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-40609",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-180198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-41112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-41110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-760688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-493444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-93633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220056",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-223511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-216017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220918",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614514",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-40608",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-180199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-41113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-260395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-260393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-220468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-2310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-93547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-180200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-180193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-93636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-90020",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-90015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-220133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-765371",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:all_supported_s:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-180216",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-180202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-40300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-93653",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-40949",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-642000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-93634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-90021",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-218028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-611401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-40610",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-611587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-642002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-493443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-642001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-180217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-180196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-165576",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-40297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-589926",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-179780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-40948",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-589925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-179779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90019",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-220326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-764737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-224787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-220189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-764827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:7.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-764828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server_-_service_controller",
"product": {
"name": "communications_converged_application_server_-_service_controller",
"product_id": "CSAFPID-764734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server_-_service_controller",
"product": {
"name": "communications_converged_application_server_-_service_controller",
"product_id": "CSAFPID-426842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-345031",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-204635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-764833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-764248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-110244",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-110242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-93777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-93772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_data_model",
"product": {
"name": "communications_data_model",
"product_id": "CSAFPID-764902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_data_model:12.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-765372",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-342799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-165544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704410",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-41183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_intelligence_hub",
"product": {
"name": "communications_diameter_intelligence_hub",
"product_id": "CSAFPID-342802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_intelligence_hub",
"product": {
"name": "communications_diameter_intelligence_hub",
"product_id": "CSAFPID-764829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1892",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1885",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1650826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1650830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_application_processor",
"product": {
"name": "communications_eagle_application_processor",
"product_id": "CSAFPID-1673417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_application_processor",
"product": {
"name": "communications_eagle_application_processor",
"product_id": "CSAFPID-765369",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:all_supported_s:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-204528",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_ftp_table_base_retrieval",
"product": {
"name": "communications_eagle_ftp_table_base_retrieval",
"product_id": "CSAFPID-204623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_lnp_application_processor",
"product": {
"name": "communications_eagle_lnp_application_processor",
"product_id": "CSAFPID-352633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_lnp_application_processor",
"product": {
"name": "communications_eagle_lnp_application_processor",
"product_id": "CSAFPID-352632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_software",
"product": {
"name": "communications_eagle_software",
"product_id": "CSAFPID-765366",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_software",
"product": {
"name": "communications_eagle_software",
"product_id": "CSAFPID-765365",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_software:46.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_elastic_charging_engine",
"product": {
"name": "communications_elastic_charging_engine",
"product_id": "CSAFPID-764834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-9226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-9070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-8845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-2286",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-345038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-93629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-611422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-93630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_evolved_communications_application_server",
"product": {
"name": "communications_evolved_communications_application_server",
"product_id": "CSAFPID-204645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-207586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-234306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-387664",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_interactive_session_recorder",
"product": {
"name": "communications_interactive_session_recorder",
"product_id": "CSAFPID-1893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_lsms",
"product": {
"name": "communications_lsms",
"product_id": "CSAFPID-1673065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_lsms:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-764835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.20.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-375182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.21.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-41182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-226017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-220167",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-764243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-764249",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-220125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-245244",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-204554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-9489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-110249",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-219898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-179774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center",
"product": {
"name": "communications_performance_intelligence_center",
"product_id": "CSAFPID-1673485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center:prior_to_10.4.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-765367",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-765368",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-764830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-573035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-45192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-611406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-204595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-204590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_services_gatekeeper",
"product": {
"name": "communications_services_gatekeeper",
"product_id": "CSAFPID-608630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-704413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-166028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2288",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2282",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2285",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2279",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-204634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-345039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-93628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-611423",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-93631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-342805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-704414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-166027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2287",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2283",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2284",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2280",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-220414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-204607",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_router",
"product": {
"name": "communications_session_router",
"product_id": "CSAFPID-764780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_router",
"product": {
"name": "communications_session_router",
"product_id": "CSAFPID-764781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_router:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_subscriber-aware_load_balancer",
"product": {
"name": "communications_subscriber-aware_load_balancer",
"product_id": "CSAFPID-93775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_subscriber-aware_load_balancer",
"product": {
"name": "communications_subscriber-aware_load_balancer",
"product_id": "CSAFPID-93774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-764901",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-614089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204614",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_session_manager",
"product": {
"name": "communications_unified_session_manager",
"product_id": "CSAFPID-110243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_session_manager",
"product": {
"name": "communications_unified_session_manager",
"product_id": "CSAFPID-205759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-764900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-76994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-568240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-764782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-355340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-611408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-703515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-611407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-204456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-37137",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-41182",
"CSAFPID-209546",
"CSAFPID-40608",
"CSAFPID-180216",
"CSAFPID-93547",
"CSAFPID-180217",
"CSAFPID-2310",
"CSAFPID-40612",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-1899",
"CSAFPID-41111",
"CSAFPID-40299",
"CSAFPID-187447",
"CSAFPID-1900",
"CSAFPID-40301",
"CSAFPID-180194",
"CSAFPID-40298",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-40300",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-40294",
"CSAFPID-110243",
"CSAFPID-204629",
"CSAFPID-765241",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-41183",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-1893",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-204456",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-204645",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180196",
"CSAFPID-180201",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-764739",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204635",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673381",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-37137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-41182",
"CSAFPID-209546",
"CSAFPID-40608",
"CSAFPID-180216",
"CSAFPID-93547",
"CSAFPID-180217",
"CSAFPID-2310",
"CSAFPID-40612",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-1899",
"CSAFPID-41111",
"CSAFPID-40299",
"CSAFPID-187447",
"CSAFPID-1900",
"CSAFPID-40301",
"CSAFPID-180194",
"CSAFPID-40298",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-40300",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-40294",
"CSAFPID-110243",
"CSAFPID-204629",
"CSAFPID-765241",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-41183",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-1893",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-204456",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-204645",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180196",
"CSAFPID-180201",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-764739",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204635",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673381",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2022-2068",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40949",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-764735",
"CSAFPID-204635",
"CSAFPID-41183",
"CSAFPID-234306",
"CSAFPID-41182",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-764738",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-220547",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-93636",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2068.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-40949",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-764735",
"CSAFPID-204635",
"CSAFPID-41183",
"CSAFPID-234306",
"CSAFPID-41182",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-764738",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-220547",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-93636",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2601",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-23437",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-204629",
"CSAFPID-704410",
"CSAFPID-704411",
"CSAFPID-704412",
"CSAFPID-226017",
"CSAFPID-179774",
"CSAFPID-219898",
"CSAFPID-219826",
"CSAFPID-204569",
"CSAFPID-204510",
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-220548",
"CSAFPID-608629",
"CSAFPID-93784",
"CSAFPID-41111",
"CSAFPID-1685",
"CSAFPID-493445",
"CSAFPID-294401",
"CSAFPID-220547",
"CSAFPID-764824",
"CSAFPID-220459",
"CSAFPID-764825",
"CSAFPID-93635",
"CSAFPID-503534",
"CSAFPID-503493",
"CSAFPID-493444",
"CSAFPID-93633",
"CSAFPID-260395",
"CSAFPID-260393",
"CSAFPID-220468",
"CSAFPID-93636",
"CSAFPID-93634",
"CSAFPID-589926",
"CSAFPID-179780",
"CSAFPID-589925",
"CSAFPID-179779",
"CSAFPID-764826",
"CSAFPID-764827",
"CSAFPID-764828",
"CSAFPID-764829",
"CSAFPID-764830",
"CSAFPID-220190",
"CSAFPID-220189",
"CSAFPID-764833",
"CSAFPID-41183",
"CSAFPID-764834",
"CSAFPID-234306",
"CSAFPID-764835",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-40949",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-204635",
"CSAFPID-41182",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-1899",
"CSAFPID-40299",
"CSAFPID-1900",
"CSAFPID-180194",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-110243",
"CSAFPID-765241",
"CSAFPID-209546",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180217",
"CSAFPID-180196",
"CSAFPID-40612",
"CSAFPID-180201",
"CSAFPID-180216",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-40608",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-2310",
"CSAFPID-93547",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673065",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23437",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-23437.json"
}
],
"title": "CVE-2022-23437"
},
{
"cve": "CVE-2022-36760",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-704412",
"CSAFPID-704411",
"CSAFPID-704410",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-704412",
"CSAFPID-704411",
"CSAFPID-704410",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2023-2953",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2953",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2953.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-2953"
},
{
"cve": "CVE-2023-3635",
"cwe": {
"id": "CWE-195",
"name": "Signed to Unsigned Conversion Error"
},
"notes": [
{
"category": "other",
"text": "Signed to Unsigned Conversion Error",
"title": "CWE-195"
},
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-204622",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-219909",
"CSAFPID-220558",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611401",
"CSAFPID-611406",
"CSAFPID-611407",
"CSAFPID-611408",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-614513",
"CSAFPID-614514",
"CSAFPID-614515",
"CSAFPID-614516",
"CSAFPID-614517",
"CSAFPID-618156",
"CSAFPID-643776",
"CSAFPID-764237",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-764240",
"CSAFPID-764241",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-764249",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3635",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3635.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-204622",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-219909",
"CSAFPID-220558",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611401",
"CSAFPID-611406",
"CSAFPID-611407",
"CSAFPID-611408",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-614513",
"CSAFPID-614514",
"CSAFPID-614515",
"CSAFPID-614516",
"CSAFPID-614517",
"CSAFPID-618156",
"CSAFPID-643776",
"CSAFPID-764237",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-764240",
"CSAFPID-764241",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-764249",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242"
]
}
],
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816352",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-342804",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-224793",
"CSAFPID-816794",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342803",
"CSAFPID-611595",
"CSAFPID-764738",
"CSAFPID-816351",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-912073",
"CSAFPID-912558"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816352",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-342804",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-224793",
"CSAFPID-816794",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342803",
"CSAFPID-611595",
"CSAFPID-764738",
"CSAFPID-816351",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-912073",
"CSAFPID-912558"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-5685",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5685",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2023-38408",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-45182",
"CSAFPID-40293",
"CSAFPID-611406",
"CSAFPID-764237",
"CSAFPID-220558",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-614513",
"CSAFPID-643776",
"CSAFPID-611387",
"CSAFPID-618156",
"CSAFPID-614516",
"CSAFPID-614515",
"CSAFPID-614514",
"CSAFPID-764240",
"CSAFPID-94291",
"CSAFPID-611401",
"CSAFPID-614517",
"CSAFPID-764241",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-342804",
"CSAFPID-611408",
"CSAFPID-611407",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-611595",
"CSAFPID-764249",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-45182",
"CSAFPID-40293",
"CSAFPID-611406",
"CSAFPID-764237",
"CSAFPID-220558",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-614513",
"CSAFPID-643776",
"CSAFPID-611387",
"CSAFPID-618156",
"CSAFPID-614516",
"CSAFPID-614515",
"CSAFPID-614514",
"CSAFPID-764240",
"CSAFPID-94291",
"CSAFPID-611401",
"CSAFPID-614517",
"CSAFPID-764241",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-342804",
"CSAFPID-611408",
"CSAFPID-611407",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-611595",
"CSAFPID-764249",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-43642",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673395",
"CSAFPID-94291",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-43642",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43642.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673395",
"CSAFPID-94291",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797"
]
}
],
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-46136",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673411",
"CSAFPID-912549",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-220132",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46136.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673411",
"CSAFPID-912549",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-220132",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-46136"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816352",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-219803",
"CSAFPID-816351",
"CSAFPID-611595",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673417",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-90016",
"CSAFPID-764826",
"CSAFPID-345038",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-93781",
"CSAFPID-345039",
"CSAFPID-912080",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-611413",
"CSAFPID-240600",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816352",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-219803",
"CSAFPID-816351",
"CSAFPID-611595",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673417",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-90016",
"CSAFPID-764826",
"CSAFPID-345038",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-93781",
"CSAFPID-345039",
"CSAFPID-912080",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-611413",
"CSAFPID-240600",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51775",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2023-52428",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912102",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912102",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650731",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650731",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-5971",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673526",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5971",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5971.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673526",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-5971"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6387",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503595",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json"
}
],
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-912101",
"CSAFPID-1673473",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912101",
"CSAFPID-1673473",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673475",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-224795",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673475",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-224795",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-22257",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650820",
"CSAFPID-1650751",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650820",
"CSAFPID-1650751",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-23672",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23672",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-23672"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650734",
"CSAFPID-1650830",
"CSAFPID-1650777",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-1650778",
"CSAFPID-41182",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650734",
"CSAFPID-1650830",
"CSAFPID-1650777",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-1650778",
"CSAFPID-41182",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-24549",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1650752",
"CSAFPID-1673481",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1650752",
"CSAFPID-1673481",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1673485",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673389",
"CSAFPID-1672767",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673415",
"CSAFPID-1673390",
"CSAFPID-1673413",
"CSAFPID-1673395",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1673485",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673389",
"CSAFPID-1672767",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673415",
"CSAFPID-1673390",
"CSAFPID-1673413",
"CSAFPID-1673395",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-29736",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-29736"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673413",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29857",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673413",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-30251",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-30251"
},
{
"cve": "CVE-2024-31080",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31080.json"
}
],
"title": "CVE-2024-31080"
},
{
"cve": "CVE-2024-31744",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31744",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31744.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-31744"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-39689",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39689",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-39689"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673516",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673516",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1674625"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1674625"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-43044",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673494",
"CSAFPID-1673393",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673494",
"CSAFPID-1673393",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-45492"
}
]
}
ncsc-2024-0414
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:17
Modified
2024-10-17 13:17
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van gegevens
- Uitvoer van willekeurige code (Gebruikersrechten)
- Uitvoer van willekeurige code (Administratorrechten)
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-122
Heap-based Buffer Overflow
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-20
Improper Input Validation
CWE-466
Return of Pointer Value Outside of Expected Range
CWE-606
Unchecked Input for Loop Condition
CWE-390
Detection of Error Condition Without Action
CWE-405
Asymmetric Resource Consumption (Amplification)
CWE-222
Truncation of Security-relevant Information
CWE-364
Signal Handler Race Condition
CWE-450
Multiple Interpretations of UI Input
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-772
Missing Release of Resource after Effective Lifetime
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-126
Buffer Over-read
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-703
Improper Check or Handling of Exceptional Conditions
CWE-427
Uncontrolled Search Path Element
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE-195
Signed to Unsigned Conversion Error
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-190
Integer Overflow or Wraparound
CWE-61
UNIX Symbolic Link (Symlink) Following
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-459
Incomplete Cleanup
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-248
Uncaught Exception
CWE-674
Uncontrolled Recursion
CWE-918
Server-Side Request Forgery (SSRF)
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van gegevens\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Signed to Unsigned Conversion Error",
"title": "CWE-195"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Incomplete Cleanup",
"title": "CWE-459"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2024-10-17T13:17:52.103171Z",
"id": "NCSC-2024-0414",
"initial_release_date": "2024-10-17T13:17:52.103171Z",
"revision_history": [
{
"date": "2024-10-17T13:17:52.103171Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-204629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-1673475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1650734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-204639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-204627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
"product": {
"name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
"product_id": "CSAFPID-219835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management__-_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3.0.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-41194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-765241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-209550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-498607",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12:0.0.5.0:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_calendar_server",
"product": {
"name": "communications_calendar_server",
"product_id": "CSAFPID-764736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_calendar_server",
"product": {
"name": "communications_calendar_server",
"product_id": "CSAFPID-220190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_configuration_console",
"product": {
"name": "communications_cloud_native_configuration_console",
"product_id": "CSAFPID-391501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_configuration_console",
"product": {
"name": "communications_cloud_native_configuration_console",
"product_id": "CSAFPID-440102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-89545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-180215",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-180197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-41516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-41515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220057",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1673411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-2045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-40612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-608629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-93784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-41111",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-493445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-294401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-220547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-220459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-45181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611403",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-611404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-912066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1503323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-165550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-93546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-180195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-40299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-187447",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-45186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-45185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-220559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-220558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-764238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-764239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-764825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:22.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-180201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-760687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-40947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-93635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-503534",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-90018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-220327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-94290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-220325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-614513",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-643776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40613",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-2044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40301",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-180194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-449747",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-40298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-223527",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-449746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-503493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-260394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-618156",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1673473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0-24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-40611",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-40609",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-180198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-41112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-41110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-760688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-493444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-93633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220056",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-223511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-216017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-220918",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-614514",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-40608",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-180199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-41113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-260395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-260393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-220468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-2310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-93547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-180200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-180193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-93636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-90020",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-90015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-220133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-765371",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:all_supported_s:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-180216",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-180202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-40300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-93653",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-40949",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-642000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-93634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-90021",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-218028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-220324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-611401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-40610",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-611587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-642002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-493443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-642001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-180217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-180196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-165576",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-40297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-589926",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-179780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-40948",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-589925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-179779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90019",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-220326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-764737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-224787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_contacts_server",
"product": {
"name": "communications_contacts_server",
"product_id": "CSAFPID-220189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-764827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:7.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-764828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server_-_service_controller",
"product": {
"name": "communications_converged_application_server_-_service_controller",
"product_id": "CSAFPID-764734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server_-_service_controller",
"product": {
"name": "communications_converged_application_server_-_service_controller",
"product_id": "CSAFPID-426842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-345031",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-204635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-764833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-764248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-110244",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-110242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-93777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-93772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_data_model",
"product": {
"name": "communications_data_model",
"product_id": "CSAFPID-764902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_data_model:12.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-765372",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-342799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-165544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-704410",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_design_studio",
"product": {
"name": "communications_design_studio",
"product_id": "CSAFPID-41183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_intelligence_hub",
"product": {
"name": "communications_diameter_intelligence_hub",
"product_id": "CSAFPID-342802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_intelligence_hub",
"product": {
"name": "communications_diameter_intelligence_hub",
"product_id": "CSAFPID-764829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1892",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1885",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1650826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1650830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_application_processor",
"product": {
"name": "communications_eagle_application_processor",
"product_id": "CSAFPID-1673417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_application_processor",
"product": {
"name": "communications_eagle_application_processor",
"product_id": "CSAFPID-765369",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:all_supported_s:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-204528",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_ftp_table_base_retrieval",
"product": {
"name": "communications_eagle_ftp_table_base_retrieval",
"product_id": "CSAFPID-204623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_lnp_application_processor",
"product": {
"name": "communications_eagle_lnp_application_processor",
"product_id": "CSAFPID-352633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_lnp_application_processor",
"product": {
"name": "communications_eagle_lnp_application_processor",
"product_id": "CSAFPID-352632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_software",
"product": {
"name": "communications_eagle_software",
"product_id": "CSAFPID-765366",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_software",
"product": {
"name": "communications_eagle_software",
"product_id": "CSAFPID-765365",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_software:46.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_elastic_charging_engine",
"product": {
"name": "communications_elastic_charging_engine",
"product_id": "CSAFPID-764834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-9226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-9070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-8845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-2286",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-204464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-345038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-93629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-611422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-93630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_evolved_communications_application_server",
"product": {
"name": "communications_evolved_communications_application_server",
"product_id": "CSAFPID-204645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-207586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-234306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-387664",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_interactive_session_recorder",
"product": {
"name": "communications_interactive_session_recorder",
"product_id": "CSAFPID-1893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_lsms",
"product": {
"name": "communications_lsms",
"product_id": "CSAFPID-1673065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_lsms:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-764835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.20.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-375182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.21.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-41182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-226017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-220167",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-764243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-764249",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-220125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-245244",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-204554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-9489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-110249",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-219898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-179774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center",
"product": {
"name": "communications_performance_intelligence_center",
"product_id": "CSAFPID-1673485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center:prior_to_10.4.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-765367",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-765368",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence_center__pic__software",
"product": {
"name": "communications_performance_intelligence_center__pic__software",
"product_id": "CSAFPID-764830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-573035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-45192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-611406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-204595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-204590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_services_gatekeeper",
"product": {
"name": "communications_services_gatekeeper",
"product_id": "CSAFPID-608630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-40291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-704413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-166028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2288",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2282",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2285",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-2279",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-204634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-345039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-93628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-611423",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-93631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-342805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-704414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-166027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2287",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2283",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2284",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2280",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-2281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-220414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_route_manager",
"product": {
"name": "communications_session_route_manager",
"product_id": "CSAFPID-204607",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_router",
"product": {
"name": "communications_session_router",
"product_id": "CSAFPID-764780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_router",
"product": {
"name": "communications_session_router",
"product_id": "CSAFPID-764781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_router:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_subscriber-aware_load_balancer",
"product": {
"name": "communications_subscriber-aware_load_balancer",
"product_id": "CSAFPID-93775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_subscriber-aware_load_balancer",
"product": {
"name": "communications_subscriber-aware_load_balancer",
"product_id": "CSAFPID-93774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-764901",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-78761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-614089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204614",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_session_manager",
"product": {
"name": "communications_unified_session_manager",
"product_id": "CSAFPID-110243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_session_manager",
"product": {
"name": "communications_unified_session_manager",
"product_id": "CSAFPID-205759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-764900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-76994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-568240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-764782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-355340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-611408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-703515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-611407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-204456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-37137",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-41182",
"CSAFPID-209546",
"CSAFPID-40608",
"CSAFPID-180216",
"CSAFPID-93547",
"CSAFPID-180217",
"CSAFPID-2310",
"CSAFPID-40612",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-1899",
"CSAFPID-41111",
"CSAFPID-40299",
"CSAFPID-187447",
"CSAFPID-1900",
"CSAFPID-40301",
"CSAFPID-180194",
"CSAFPID-40298",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-40300",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-40294",
"CSAFPID-110243",
"CSAFPID-204629",
"CSAFPID-765241",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-41183",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-1893",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-204456",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-204645",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180196",
"CSAFPID-180201",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-764739",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204635",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673381",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-37137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-41182",
"CSAFPID-209546",
"CSAFPID-40608",
"CSAFPID-180216",
"CSAFPID-93547",
"CSAFPID-180217",
"CSAFPID-2310",
"CSAFPID-40612",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-1899",
"CSAFPID-41111",
"CSAFPID-40299",
"CSAFPID-187447",
"CSAFPID-1900",
"CSAFPID-40301",
"CSAFPID-180194",
"CSAFPID-40298",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-40300",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-40294",
"CSAFPID-110243",
"CSAFPID-204629",
"CSAFPID-765241",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-41183",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-1893",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-204456",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-204645",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180196",
"CSAFPID-180201",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-764739",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204635",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673381",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2022-2068",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40949",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-764735",
"CSAFPID-204635",
"CSAFPID-41183",
"CSAFPID-234306",
"CSAFPID-41182",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-764738",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-220547",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-93636",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2068.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-40949",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45182",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-216017",
"CSAFPID-764240",
"CSAFPID-90021",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-94291",
"CSAFPID-493443",
"CSAFPID-224796",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-40293",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-93781",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-342793",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-342803",
"CSAFPID-204563",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-764735",
"CSAFPID-204635",
"CSAFPID-41183",
"CSAFPID-234306",
"CSAFPID-41182",
"CSAFPID-226017",
"CSAFPID-219898",
"CSAFPID-179774",
"CSAFPID-764738",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-220547",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-93636",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2601",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-23437",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-204629",
"CSAFPID-704410",
"CSAFPID-704411",
"CSAFPID-704412",
"CSAFPID-226017",
"CSAFPID-179774",
"CSAFPID-219898",
"CSAFPID-219826",
"CSAFPID-204569",
"CSAFPID-204510",
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-220548",
"CSAFPID-608629",
"CSAFPID-93784",
"CSAFPID-41111",
"CSAFPID-1685",
"CSAFPID-493445",
"CSAFPID-294401",
"CSAFPID-220547",
"CSAFPID-764824",
"CSAFPID-220459",
"CSAFPID-764825",
"CSAFPID-93635",
"CSAFPID-503534",
"CSAFPID-503493",
"CSAFPID-493444",
"CSAFPID-93633",
"CSAFPID-260395",
"CSAFPID-260393",
"CSAFPID-220468",
"CSAFPID-93636",
"CSAFPID-93634",
"CSAFPID-589926",
"CSAFPID-179780",
"CSAFPID-589925",
"CSAFPID-179779",
"CSAFPID-764826",
"CSAFPID-764827",
"CSAFPID-764828",
"CSAFPID-764829",
"CSAFPID-764830",
"CSAFPID-220190",
"CSAFPID-220189",
"CSAFPID-764833",
"CSAFPID-41183",
"CSAFPID-764834",
"CSAFPID-234306",
"CSAFPID-764835",
"CSAFPID-187447",
"CSAFPID-760687",
"CSAFPID-40947",
"CSAFPID-2044",
"CSAFPID-449747",
"CSAFPID-40301",
"CSAFPID-449746",
"CSAFPID-40298",
"CSAFPID-223527",
"CSAFPID-760688",
"CSAFPID-40300",
"CSAFPID-93653",
"CSAFPID-40949",
"CSAFPID-642000",
"CSAFPID-642002",
"CSAFPID-642001",
"CSAFPID-165576",
"CSAFPID-764899",
"CSAFPID-40948",
"CSAFPID-426842",
"CSAFPID-93630",
"CSAFPID-204645",
"CSAFPID-1893",
"CSAFPID-40294",
"CSAFPID-93631",
"CSAFPID-764900",
"CSAFPID-568240",
"CSAFPID-355340",
"CSAFPID-703515",
"CSAFPID-204456",
"CSAFPID-204635",
"CSAFPID-41182",
"CSAFPID-764901",
"CSAFPID-764902",
"CSAFPID-1899",
"CSAFPID-40299",
"CSAFPID-1900",
"CSAFPID-180194",
"CSAFPID-41112",
"CSAFPID-41110",
"CSAFPID-41113",
"CSAFPID-180193",
"CSAFPID-1898",
"CSAFPID-611587",
"CSAFPID-40297",
"CSAFPID-110244",
"CSAFPID-110242",
"CSAFPID-9489",
"CSAFPID-110249",
"CSAFPID-110243",
"CSAFPID-765241",
"CSAFPID-209546",
"CSAFPID-207586",
"CSAFPID-765242",
"CSAFPID-205759",
"CSAFPID-765365",
"CSAFPID-765366",
"CSAFPID-342804",
"CSAFPID-342805",
"CSAFPID-1882",
"CSAFPID-573035",
"CSAFPID-765367",
"CSAFPID-765368",
"CSAFPID-764242",
"CSAFPID-76994",
"CSAFPID-204623",
"CSAFPID-352633",
"CSAFPID-352632",
"CSAFPID-765369",
"CSAFPID-204528",
"CSAFPID-342802",
"CSAFPID-40610",
"CSAFPID-40611",
"CSAFPID-40609",
"CSAFPID-180198",
"CSAFPID-180217",
"CSAFPID-180196",
"CSAFPID-40612",
"CSAFPID-180201",
"CSAFPID-180216",
"CSAFPID-180202",
"CSAFPID-40613",
"CSAFPID-40608",
"CSAFPID-180199",
"CSAFPID-93546",
"CSAFPID-180195",
"CSAFPID-2310",
"CSAFPID-93547",
"CSAFPID-180200",
"CSAFPID-765371",
"CSAFPID-89545",
"CSAFPID-180215",
"CSAFPID-180197",
"CSAFPID-204639",
"CSAFPID-204627",
"CSAFPID-342799",
"CSAFPID-765372",
"CSAFPID-220125",
"CSAFPID-245244",
"CSAFPID-204554",
"CSAFPID-204614",
"CSAFPID-345031",
"CSAFPID-204595",
"CSAFPID-204590",
"CSAFPID-224787",
"CSAFPID-1673065",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23437",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-23437.json"
}
],
"title": "CVE-2022-23437"
},
{
"cve": "CVE-2022-36760",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-704412",
"CSAFPID-704411",
"CSAFPID-704410",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220057",
"CSAFPID-220055",
"CSAFPID-220909",
"CSAFPID-45184",
"CSAFPID-45182",
"CSAFPID-220559",
"CSAFPID-220558",
"CSAFPID-220327",
"CSAFPID-220325",
"CSAFPID-219838",
"CSAFPID-220056",
"CSAFPID-223511",
"CSAFPID-216017",
"CSAFPID-220889",
"CSAFPID-220918",
"CSAFPID-90020",
"CSAFPID-90015",
"CSAFPID-220133",
"CSAFPID-220561",
"CSAFPID-90021",
"CSAFPID-220881",
"CSAFPID-94291",
"CSAFPID-220910",
"CSAFPID-220324",
"CSAFPID-224796",
"CSAFPID-224795",
"CSAFPID-220326",
"CSAFPID-764734",
"CSAFPID-40293",
"CSAFPID-220167",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764736",
"CSAFPID-764737",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-704412",
"CSAFPID-704411",
"CSAFPID-704410",
"CSAFPID-219803",
"CSAFPID-375182",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-219776",
"CSAFPID-224791",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-764738",
"CSAFPID-240600",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-391501",
"CSAFPID-440102",
"CSAFPID-41516",
"CSAFPID-41515",
"CSAFPID-764237",
"CSAFPID-45181",
"CSAFPID-45186",
"CSAFPID-45185",
"CSAFPID-90018",
"CSAFPID-94290",
"CSAFPID-260394",
"CSAFPID-764240",
"CSAFPID-94292",
"CSAFPID-218028",
"CSAFPID-493443",
"CSAFPID-90019",
"CSAFPID-90016",
"CSAFPID-93777",
"CSAFPID-93772",
"CSAFPID-345038",
"CSAFPID-93629",
"CSAFPID-45192",
"CSAFPID-608630",
"CSAFPID-40292",
"CSAFPID-40291",
"CSAFPID-345039",
"CSAFPID-93628",
"CSAFPID-764780",
"CSAFPID-764781",
"CSAFPID-93775",
"CSAFPID-93774",
"CSAFPID-764782",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-204563",
"CSAFPID-8984",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2023-2953",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2953",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2953.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-2953"
},
{
"cve": "CVE-2023-3635",
"cwe": {
"id": "CWE-195",
"name": "Signed to Unsigned Conversion Error"
},
"notes": [
{
"category": "other",
"text": "Signed to Unsigned Conversion Error",
"title": "CWE-195"
},
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-204622",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-219909",
"CSAFPID-220558",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611401",
"CSAFPID-611406",
"CSAFPID-611407",
"CSAFPID-611408",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-614513",
"CSAFPID-614514",
"CSAFPID-614515",
"CSAFPID-614516",
"CSAFPID-614517",
"CSAFPID-618156",
"CSAFPID-643776",
"CSAFPID-764237",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-764240",
"CSAFPID-764241",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-764249",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3635",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3635.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-204622",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-219909",
"CSAFPID-220558",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611401",
"CSAFPID-611406",
"CSAFPID-611407",
"CSAFPID-611408",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-614513",
"CSAFPID-614514",
"CSAFPID-614515",
"CSAFPID-614516",
"CSAFPID-614517",
"CSAFPID-618156",
"CSAFPID-643776",
"CSAFPID-764237",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-764240",
"CSAFPID-764241",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-764249",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242"
]
}
],
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816352",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-342804",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-224793",
"CSAFPID-816794",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342803",
"CSAFPID-611595",
"CSAFPID-764738",
"CSAFPID-816351",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-912073",
"CSAFPID-912558"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816352",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-342804",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-224793",
"CSAFPID-816794",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-219803",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-240600",
"CSAFPID-342803",
"CSAFPID-611595",
"CSAFPID-764738",
"CSAFPID-816351",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-912073",
"CSAFPID-912558"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-5685",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5685",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-6816"
},
{
"cve": "CVE-2023-38408",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-45182",
"CSAFPID-40293",
"CSAFPID-611406",
"CSAFPID-764237",
"CSAFPID-220558",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-614513",
"CSAFPID-643776",
"CSAFPID-611387",
"CSAFPID-618156",
"CSAFPID-614516",
"CSAFPID-614515",
"CSAFPID-614514",
"CSAFPID-764240",
"CSAFPID-94291",
"CSAFPID-611401",
"CSAFPID-614517",
"CSAFPID-764241",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-342804",
"CSAFPID-611408",
"CSAFPID-611407",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-611595",
"CSAFPID-764249",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-45182",
"CSAFPID-40293",
"CSAFPID-611406",
"CSAFPID-764237",
"CSAFPID-220558",
"CSAFPID-764238",
"CSAFPID-764239",
"CSAFPID-614513",
"CSAFPID-643776",
"CSAFPID-611387",
"CSAFPID-618156",
"CSAFPID-614516",
"CSAFPID-614515",
"CSAFPID-614514",
"CSAFPID-764240",
"CSAFPID-94291",
"CSAFPID-611401",
"CSAFPID-614517",
"CSAFPID-764241",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-764243",
"CSAFPID-342804",
"CSAFPID-611408",
"CSAFPID-611407",
"CSAFPID-764247",
"CSAFPID-764248",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-611595",
"CSAFPID-764249",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-240600",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-38408"
},
{
"cve": "CVE-2023-43642",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673395",
"CSAFPID-94291",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-43642",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43642.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-1673395",
"CSAFPID-94291",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797"
]
}
],
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-46136",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673411",
"CSAFPID-912549",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-220132",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46136.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673411",
"CSAFPID-912549",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-220132",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2023-46136"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816352",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-219803",
"CSAFPID-816351",
"CSAFPID-611595",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673417",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-90016",
"CSAFPID-764826",
"CSAFPID-345038",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-93781",
"CSAFPID-345039",
"CSAFPID-912080",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-611413",
"CSAFPID-240600",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-219838",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816346",
"CSAFPID-816776",
"CSAFPID-816348",
"CSAFPID-816777",
"CSAFPID-816347",
"CSAFPID-94291",
"CSAFPID-816778",
"CSAFPID-614517",
"CSAFPID-816779",
"CSAFPID-816349",
"CSAFPID-40293",
"CSAFPID-764242",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816353",
"CSAFPID-816786",
"CSAFPID-816352",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-224793",
"CSAFPID-342793",
"CSAFPID-1265",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-219803",
"CSAFPID-816351",
"CSAFPID-611595",
"CSAFPID-342803",
"CSAFPID-1266",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673417",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-90016",
"CSAFPID-764826",
"CSAFPID-345038",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-93781",
"CSAFPID-345039",
"CSAFPID-912080",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-611413",
"CSAFPID-240600",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-8984",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-1503601",
"CSAFPID-1503602"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51775",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2023-52428",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912102",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912073",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912102",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650731",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650731",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-5971",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673526",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5971",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5971.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1673399",
"CSAFPID-1673526",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-5971"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6387",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503595",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json"
}
],
"title": "CVE-2024-6387"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-912101",
"CSAFPID-1673473",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912101",
"CSAFPID-1673473",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673475",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-224795",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673475",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-224795",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-22257",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650820",
"CSAFPID-1650751",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650820",
"CSAFPID-1650751",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-23672",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "other",
"text": "Incomplete Cleanup",
"title": "CWE-459"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23672",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-23672"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650734",
"CSAFPID-1650830",
"CSAFPID-1650777",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-1650778",
"CSAFPID-41182",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650734",
"CSAFPID-1650830",
"CSAFPID-1650777",
"CSAFPID-204622",
"CSAFPID-219909",
"CSAFPID-1650778",
"CSAFPID-41182",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-24549",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650826",
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1650752",
"CSAFPID-1673481",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650751",
"CSAFPID-1650752",
"CSAFPID-1673481",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1673485",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673389",
"CSAFPID-1672767",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673415",
"CSAFPID-1673390",
"CSAFPID-1673413",
"CSAFPID-1673395",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1673485",
"CSAFPID-1673393",
"CSAFPID-1673394",
"CSAFPID-1673389",
"CSAFPID-1672767",
"CSAFPID-1673391",
"CSAFPID-1673392",
"CSAFPID-1673415",
"CSAFPID-1673390",
"CSAFPID-1673413",
"CSAFPID-1673395",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-29736",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673399",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-29736"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673413",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29857",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673413",
"CSAFPID-1673415",
"CSAFPID-1673501",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569"
]
}
],
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-30251",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-30251"
},
{
"cve": "CVE-2024-31080",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31080.json"
}
],
"title": "CVE-2024-31080"
},
{
"cve": "CVE-2024-31744",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31744",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31744.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673392",
"CSAFPID-1673393",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-31744"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-39689",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39689",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-39689"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673516",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673516",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1650731",
"CSAFPID-1673382",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1674625"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1674625"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-43044",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673494",
"CSAFPID-1673393",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673411",
"CSAFPID-1673412",
"CSAFPID-1673413",
"CSAFPID-1673396",
"CSAFPID-1673392",
"CSAFPID-1673494",
"CSAFPID-1673393",
"CSAFPID-1673415",
"CSAFPID-1673416",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646"
]
}
],
"title": "CVE-2024-45492"
}
]
}
msrc_cve-2023-6816
Vulnerability from csaf_microsoft
Published
2024-01-01 08:00
Modified
2024-01-19 00:00
Summary
Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer
Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6816 Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2023-6816.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer",
"tracking": {
"current_release_date": "2024-01-19T00:00:00.000Z",
"generator": {
"date": "2025-10-20T00:58:25.386Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-6816",
"initial_release_date": "2024-01-01T08:00:00.000Z",
"revision_history": [
{
"date": "2024-01-19T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 xorg-x11-server 1.20.10-15",
"product": {
"name": "\u003ccbl2 xorg-x11-server 1.20.10-15",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 xorg-x11-server 1.20.10-15",
"product": {
"name": "cbl2 xorg-x11-server 1.20.10-15",
"product_id": "19982"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 xorg-x11-server 1.20.10-10",
"product": {
"name": "\u003ccbl2 xorg-x11-server 1.20.10-10",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 xorg-x11-server 1.20.10-10",
"product": {
"name": "cbl2 xorg-x11-server 1.20.10-10",
"product_id": "17430"
}
}
],
"category": "product_name",
"name": "xorg-x11-server"
},
{
"category": "product_name",
"name": "azl3 xorg-x11-server 1.20.10-5",
"product": {
"name": "azl3 xorg-x11-server 1.20.10-5",
"product_id": "2"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 xorg-x11-server 1.20.10-15 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 xorg-x11-server 1.20.10-15 as a component of CBL Mariner 2.0",
"product_id": "19982-17086"
},
"product_reference": "19982",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 xorg-x11-server 1.20.10-10 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 xorg-x11-server 1.20.10-10 as a component of CBL Mariner 2.0",
"product_id": "17430-17086"
},
"product_reference": "17430",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 xorg-x11-server 1.20.10-5 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-6816",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-2"
]
}
],
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19982-17086",
"17430-17086"
],
"known_affected": [
"17086-1",
"17086-3"
],
"known_not_affected": [
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6816 Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2023-6816.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-19T00:00:00.000Z",
"details": "1.20.10-10:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1",
"17086-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17086-1",
"17086-3"
]
}
],
"title": "Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…